Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-40896 (GCVE-0-2024-40896)
Vulnerability from cvelistv5
- CWE-611 - Improper Restriction of XML External Entity Reference
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40896", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-24T02:10:22.590277Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-24T02:11:06.747Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-02-28T13:07:30.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250228-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "libxml2", "vendor": "libxml2", "versions": [ { "lessThan": "2.11.9", "status": "affected", "version": "2.11.0", "versionType": "semver" }, { "lessThan": "2.12.9", "status": "affected", "version": "2.12.0", "versionType": "semver" }, { "lessThan": "2.13.3", "status": "affected", "version": "2.13.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-23T17:21:42.188Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761" }, { "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40896", "datePublished": "2024-12-23T00:00:00.000Z", "dateReserved": "2024-07-12T00:00:00.000Z", "dateUpdated": "2025-02-28T13:07:30.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-40896\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-12-23T17:15:08.400\",\"lastModified\":\"2025-02-28T13:15:26.640\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\"},{\"lang\":\"es\",\"value\":\"En libxml2 2.11 anterior a 2.11.9, 2.12 anterior a 2.12.9 y 2.13 anterior a 2.13.3, el analizador SAX puede producir eventos para entidades externas incluso si los controladores SAX personalizados intentan anular el contenido de la entidad (estableciendo \\\"marcado\\\"). Esto hace posibles los ataques XXE cl\u00e1sicos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"references\":[{\"url\":\"https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gitlab.gnome.org/GNOME/libxml2/-/issues/761\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250228-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250228-0004/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-02-28T13:07:30.165Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-40896\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-24T02:10:22.590277Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-24T02:11:00.509Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"libxml2\", \"product\": \"libxml2\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.11.0\", \"lessThan\": \"2.11.9\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"2.12.0\", \"lessThan\": \"2.12.9\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"2.13.0\", \"lessThan\": \"2.13.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://gitlab.gnome.org/GNOME/libxml2/-/issues/761\"}, {\"url\": \"https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \\\"checked\\\"). This makes classic XXE attacks possible.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-611\", \"description\": \"CWE-611 Improper Restriction of XML External Entity Reference\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-12-23T17:21:42.188Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-40896\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-28T13:07:30.165Z\", \"dateReserved\": \"2024-07-12T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-12-23T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2025:0024-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for qt6-webengine", "title": "Title of the patch" }, { "category": "description", "text": "This update for qt6-webengine fixes the following issues:\n\n- CVE-2024-40896: Fixed a XML external entity vulnerability related to libxml2 (boo#1234820)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2025-24", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_0024-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:0024-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJTWGGN25MWIFFI6LEBRJNH3QPOW4COP/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:0024-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJTWGGN25MWIFFI6LEBRJNH3QPOW4COP/" }, { "category": "self", "summary": "SUSE Bug 1234820", "url": "https://bugzilla.suse.com/1234820" }, { "category": "self", "summary": "SUSE CVE CVE-2024-40896 page", "url": "https://www.suse.com/security/cve/CVE-2024-40896/" } ], "title": "Security update for qt6-webengine", "tracking": { "current_release_date": "2025-01-23T09:21:43Z", "generator": { "date": "2025-01-23T09:21:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:0024-1", "initial_release_date": "2025-01-23T09:21:43Z", "revision_history": [ { "date": "2025-01-23T09:21:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "product_id": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "product": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "product_id": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "product_id": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "product": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "product_id": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15 SP6", "product": { "name": "SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6" } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of SUSE Package Hub 15 SP6", "product_id": "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-40896" } ], "notes": [ { "category": "general", "text": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-40896", "url": "https://www.suse.com/security/cve/CVE-2024-40896" }, { "category": "external", "summary": "SUSE Bug 1234812 for CVE-2024-40896", "url": "https://bugzilla.suse.com/1234812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "SUSE Package Hub 15 SP6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6Pdf6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6PdfWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineCore6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineQuick6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:libQt6WebEngineWidgets6-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdf-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfquick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-pdfwidgets-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-html-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-docs-qch-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-examples-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webengine-imports-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginecore-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginequick-private-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-devel-6.6.3-bp156.2.3.1.x86_64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.aarch64", "openSUSE Leap 15.6:qt6-webenginewidgets-private-devel-6.6.3-bp156.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-23T09:21:43Z", "details": "important" } ], "title": "CVE-2024-40896" } ] }
opensuse-su-2024:14241-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libxml2-2-2.12.9-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libxml2-2-2.12.9-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14241", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14241-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-40896 page", "url": "https://www.suse.com/security/cve/CVE-2024-40896/" } ], "title": "libxml2-2-2.12.9-1.1 on GA media", "tracking": { "current_release_date": "2024-08-06T00:00:00Z", "generator": { "date": "2024-08-06T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14241-1", "initial_release_date": "2024-08-06T00:00:00Z", "revision_history": [ { "date": "2024-08-06T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libxml2-2-2.12.9-1.1.aarch64", "product": { "name": "libxml2-2-2.12.9-1.1.aarch64", "product_id": "libxml2-2-2.12.9-1.1.aarch64" } }, { "category": "product_version", "name": "libxml2-2-32bit-2.12.9-1.1.aarch64", "product": { "name": "libxml2-2-32bit-2.12.9-1.1.aarch64", "product_id": "libxml2-2-32bit-2.12.9-1.1.aarch64" } }, { "category": "product_version", "name": "libxml2-devel-2.12.9-1.1.aarch64", "product": { "name": "libxml2-devel-2.12.9-1.1.aarch64", "product_id": "libxml2-devel-2.12.9-1.1.aarch64" } }, { "category": "product_version", "name": "libxml2-devel-32bit-2.12.9-1.1.aarch64", "product": { "name": "libxml2-devel-32bit-2.12.9-1.1.aarch64", "product_id": "libxml2-devel-32bit-2.12.9-1.1.aarch64" } }, { "category": "product_version", "name": "libxml2-doc-2.12.9-1.1.aarch64", "product": { "name": "libxml2-doc-2.12.9-1.1.aarch64", "product_id": "libxml2-doc-2.12.9-1.1.aarch64" } }, { "category": "product_version", "name": "libxml2-tools-2.12.9-1.1.aarch64", "product": { "name": "libxml2-tools-2.12.9-1.1.aarch64", "product_id": "libxml2-tools-2.12.9-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libxml2-2-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-2-2.12.9-1.1.ppc64le", "product_id": "libxml2-2-2.12.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libxml2-2-32bit-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-2-32bit-2.12.9-1.1.ppc64le", "product_id": "libxml2-2-32bit-2.12.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libxml2-devel-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-devel-2.12.9-1.1.ppc64le", "product_id": "libxml2-devel-2.12.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libxml2-devel-32bit-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-devel-32bit-2.12.9-1.1.ppc64le", "product_id": "libxml2-devel-32bit-2.12.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libxml2-doc-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-doc-2.12.9-1.1.ppc64le", "product_id": "libxml2-doc-2.12.9-1.1.ppc64le" } }, { "category": "product_version", "name": "libxml2-tools-2.12.9-1.1.ppc64le", "product": { "name": "libxml2-tools-2.12.9-1.1.ppc64le", "product_id": "libxml2-tools-2.12.9-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libxml2-2-2.12.9-1.1.s390x", "product": { "name": "libxml2-2-2.12.9-1.1.s390x", "product_id": "libxml2-2-2.12.9-1.1.s390x" } }, { "category": "product_version", "name": "libxml2-2-32bit-2.12.9-1.1.s390x", "product": { "name": "libxml2-2-32bit-2.12.9-1.1.s390x", "product_id": "libxml2-2-32bit-2.12.9-1.1.s390x" } }, { "category": "product_version", "name": "libxml2-devel-2.12.9-1.1.s390x", "product": { "name": "libxml2-devel-2.12.9-1.1.s390x", "product_id": "libxml2-devel-2.12.9-1.1.s390x" } }, { "category": "product_version", "name": "libxml2-devel-32bit-2.12.9-1.1.s390x", "product": { "name": "libxml2-devel-32bit-2.12.9-1.1.s390x", "product_id": "libxml2-devel-32bit-2.12.9-1.1.s390x" } }, { "category": "product_version", "name": "libxml2-doc-2.12.9-1.1.s390x", "product": { "name": "libxml2-doc-2.12.9-1.1.s390x", "product_id": "libxml2-doc-2.12.9-1.1.s390x" } }, { "category": "product_version", "name": "libxml2-tools-2.12.9-1.1.s390x", "product": { "name": "libxml2-tools-2.12.9-1.1.s390x", "product_id": "libxml2-tools-2.12.9-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libxml2-2-2.12.9-1.1.x86_64", "product": { "name": "libxml2-2-2.12.9-1.1.x86_64", "product_id": "libxml2-2-2.12.9-1.1.x86_64" } }, { "category": "product_version", "name": "libxml2-2-32bit-2.12.9-1.1.x86_64", "product": { "name": "libxml2-2-32bit-2.12.9-1.1.x86_64", "product_id": "libxml2-2-32bit-2.12.9-1.1.x86_64" } }, { "category": "product_version", "name": "libxml2-devel-2.12.9-1.1.x86_64", "product": { "name": "libxml2-devel-2.12.9-1.1.x86_64", "product_id": "libxml2-devel-2.12.9-1.1.x86_64" } }, { "category": "product_version", "name": "libxml2-devel-32bit-2.12.9-1.1.x86_64", "product": { "name": "libxml2-devel-32bit-2.12.9-1.1.x86_64", "product_id": "libxml2-devel-32bit-2.12.9-1.1.x86_64" } }, { "category": "product_version", "name": "libxml2-doc-2.12.9-1.1.x86_64", "product": { "name": "libxml2-doc-2.12.9-1.1.x86_64", "product_id": "libxml2-doc-2.12.9-1.1.x86_64" } }, { "category": "product_version", "name": "libxml2-tools-2.12.9-1.1.x86_64", "product": { "name": "libxml2-tools-2.12.9-1.1.x86_64", "product_id": "libxml2-tools-2.12.9-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-2-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-2-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.s390x" }, "product_reference": "libxml2-2-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-2-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-32bit-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-2-32bit-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-32bit-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-2-32bit-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-32bit-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.s390x" }, "product_reference": "libxml2-2-32bit-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-2-32bit-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-2-32bit-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-devel-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-devel-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.s390x" }, "product_reference": "libxml2-devel-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-devel-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-32bit-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-devel-32bit-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-32bit-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-devel-32bit-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-32bit-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.s390x" }, "product_reference": "libxml2-devel-32bit-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-32bit-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-devel-32bit-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-doc-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-doc-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-doc-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-doc-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-doc-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.s390x" }, "product_reference": "libxml2-doc-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-doc-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-doc-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-tools-2.12.9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.aarch64" }, "product_reference": "libxml2-tools-2.12.9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-tools-2.12.9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.ppc64le" }, "product_reference": "libxml2-tools-2.12.9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-tools-2.12.9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.s390x" }, "product_reference": "libxml2-tools-2.12.9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-tools-2.12.9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.x86_64" }, "product_reference": "libxml2-tools-2.12.9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-40896" } ], "notes": [ { "category": "general", "text": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-40896", "url": "https://www.suse.com/security/cve/CVE-2024-40896" }, { "category": "external", "summary": "SUSE Bug 1234812 for CVE-2024-40896", "url": "https://bugzilla.suse.com/1234812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-2-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-devel-32bit-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-doc-2.12.9-1.1.x86_64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.aarch64", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.ppc64le", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.s390x", "openSUSE Tumbleweed:libxml2-tools-2.12.9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-08-06T00:00:00Z", "details": "important" } ], "title": "CVE-2024-40896" } ] }
opensuse-su-2024:14611-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libQt6Pdf6-6.8.1-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libQt6Pdf6-6.8.1-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14611", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14611-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14611-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNFRSHS45PIJOVDOQPX33OOOOBMDTP7F/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14611-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNFRSHS45PIJOVDOQPX33OOOOBMDTP7F/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-40896 page", "url": "https://www.suse.com/security/cve/CVE-2024-40896/" } ], "title": "libQt6Pdf6-6.8.1-2.1 on GA media", "tracking": { "current_release_date": "2024-12-29T00:00:00Z", "generator": { "date": "2024-12-29T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14611-1", "initial_release_date": "2024-12-29T00:00:00Z", "revision_history": [ { "date": "2024-12-29T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.8.1-2.1.aarch64", "product": { "name": "libQt6Pdf6-6.8.1-2.1.aarch64", "product_id": "libQt6Pdf6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.8.1-2.1.aarch64", "product": { "name": "libQt6PdfQuick6-6.8.1-2.1.aarch64", "product_id": "libQt6PdfQuick6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.8.1-2.1.aarch64", "product": { "name": "libQt6PdfWidgets6-6.8.1-2.1.aarch64", "product_id": "libQt6PdfWidgets6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.8.1-2.1.aarch64", "product": { "name": "libQt6WebEngineCore6-6.8.1-2.1.aarch64", "product_id": "libQt6WebEngineCore6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "product": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "product_id": "libQt6WebEngineQuick6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "product": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "product_id": "libQt6WebEngineWidgets6-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdf-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdf-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdf-imports-6.8.1-2.1.aarch64", "product_id": "qt6-pdf-imports-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdf-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdf-private-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdfquick-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdfquick-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdfquick-private-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdfwidgets-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-6.8.1-2.1.aarch64", "product": { "name": "qt6-webengine-6.8.1-2.1.aarch64", "product_id": "qt6-webengine-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.8.1-2.1.aarch64", "product": { "name": "qt6-webengine-examples-6.8.1-2.1.aarch64", "product_id": "qt6-webengine-examples-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.8.1-2.1.aarch64", "product": { "name": "qt6-webengine-imports-6.8.1-2.1.aarch64", "product_id": "qt6-webengine-imports-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginecore-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginecore-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginecore-private-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginequick-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginequick-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginequick-private-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginewidgets-devel-6.8.1-2.1.aarch64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "product": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "product_id": "qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6Pdf6-6.8.1-2.1.ppc64le", "product_id": "libQt6Pdf6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6PdfQuick6-6.8.1-2.1.ppc64le", "product_id": "libQt6PdfQuick6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "product_id": "libQt6PdfWidgets6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "product_id": "libQt6WebEngineCore6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "product_id": "libQt6WebEngineQuick6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "product": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "product_id": "libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdf-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdf-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdf-imports-6.8.1-2.1.ppc64le", "product_id": "qt6-pdf-imports-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdf-private-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdfquick-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webengine-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webengine-6.8.1-2.1.ppc64le", "product_id": "qt6-webengine-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webengine-examples-6.8.1-2.1.ppc64le", "product_id": "qt6-webengine-examples-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webengine-imports-6.8.1-2.1.ppc64le", "product_id": "qt6-webengine-imports-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginecore-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginequick-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "product": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "product_id": "qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.8.1-2.1.s390x", "product": { "name": "libQt6Pdf6-6.8.1-2.1.s390x", "product_id": "libQt6Pdf6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.8.1-2.1.s390x", "product": { "name": "libQt6PdfQuick6-6.8.1-2.1.s390x", "product_id": "libQt6PdfQuick6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.8.1-2.1.s390x", "product": { "name": "libQt6PdfWidgets6-6.8.1-2.1.s390x", "product_id": "libQt6PdfWidgets6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.8.1-2.1.s390x", "product": { "name": "libQt6WebEngineCore6-6.8.1-2.1.s390x", "product_id": "libQt6WebEngineCore6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.8.1-2.1.s390x", "product": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.s390x", "product_id": "libQt6WebEngineQuick6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "product": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "product_id": "libQt6WebEngineWidgets6-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdf-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdf-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.8.1-2.1.s390x", "product": { "name": "qt6-pdf-imports-6.8.1-2.1.s390x", "product_id": "qt6-pdf-imports-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdf-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdf-private-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdfquick-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdfquick-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdfquick-private-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdfwidgets-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webengine-6.8.1-2.1.s390x", "product": { "name": "qt6-webengine-6.8.1-2.1.s390x", "product_id": "qt6-webengine-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.8.1-2.1.s390x", "product": { "name": "qt6-webengine-examples-6.8.1-2.1.s390x", "product_id": "qt6-webengine-examples-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.8.1-2.1.s390x", "product": { "name": "qt6-webengine-imports-6.8.1-2.1.s390x", "product_id": "qt6-webengine-imports-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginecore-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginecore-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginecore-private-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginequick-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginequick-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginequick-private-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginewidgets-devel-6.8.1-2.1.s390x" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "product": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "product_id": "qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libQt6Pdf6-6.8.1-2.1.x86_64", "product": { "name": "libQt6Pdf6-6.8.1-2.1.x86_64", "product_id": "libQt6Pdf6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "libQt6PdfQuick6-6.8.1-2.1.x86_64", "product": { "name": "libQt6PdfQuick6-6.8.1-2.1.x86_64", "product_id": "libQt6PdfQuick6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "libQt6PdfWidgets6-6.8.1-2.1.x86_64", "product": { "name": "libQt6PdfWidgets6-6.8.1-2.1.x86_64", "product_id": "libQt6PdfWidgets6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineCore6-6.8.1-2.1.x86_64", "product": { "name": "libQt6WebEngineCore6-6.8.1-2.1.x86_64", "product_id": "libQt6WebEngineCore6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "product": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "product_id": "libQt6WebEngineQuick6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "product": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "product_id": "libQt6WebEngineWidgets6-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdf-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdf-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-imports-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdf-imports-6.8.1-2.1.x86_64", "product_id": "qt6-pdf-imports-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdf-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdf-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdf-private-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfquick-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdfquick-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdfquick-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdfquick-private-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdfwidgets-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-6.8.1-2.1.x86_64", "product": { "name": "qt6-webengine-6.8.1-2.1.x86_64", "product_id": "qt6-webengine-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-examples-6.8.1-2.1.x86_64", "product": { "name": "qt6-webengine-examples-6.8.1-2.1.x86_64", "product_id": "qt6-webengine-examples-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webengine-imports-6.8.1-2.1.x86_64", "product": { "name": "qt6-webengine-imports-6.8.1-2.1.x86_64", "product_id": "qt6-webengine-imports-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginecore-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginecore-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginecore-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginecore-private-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginequick-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginequick-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginequick-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginequick-private-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginewidgets-devel-6.8.1-2.1.x86_64" } }, { "category": "product_version", "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64", "product": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64", "product_id": "qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6Pdf6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6Pdf6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.s390x" }, "product_reference": "libQt6Pdf6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6Pdf6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6Pdf6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6PdfQuick6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6PdfQuick6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.s390x" }, "product_reference": "libQt6PdfQuick6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfQuick6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6PdfQuick6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6PdfWidgets6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.s390x" }, "product_reference": "libQt6PdfWidgets6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6PdfWidgets6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6PdfWidgets6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6WebEngineCore6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.s390x" }, "product_reference": "libQt6WebEngineCore6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineCore6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6WebEngineCore6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.s390x" }, "product_reference": "libQt6WebEngineQuick6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineQuick6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.aarch64" }, "product_reference": "libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le" }, "product_reference": "libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.s390x" }, "product_reference": "libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libQt6WebEngineWidgets6-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.x86_64" }, "product_reference": "libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdf-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdf-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdf-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdf-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdf-imports-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdf-imports-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdf-imports-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-imports-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdf-imports-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdf-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdf-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdf-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdf-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdfquick-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdfquick-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdfquick-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfquick-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webengine-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webengine-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.s390x" }, "product_reference": "qt6-webengine-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webengine-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webengine-examples-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webengine-examples-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.s390x" }, "product_reference": "qt6-webengine-examples-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-examples-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webengine-examples-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webengine-imports-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webengine-imports-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.s390x" }, "product_reference": "qt6-webengine-imports-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webengine-imports-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webengine-imports-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginecore-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginecore-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginecore-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginecore-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginequick-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginequick-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginequick-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginequick-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le" }, "product_reference": "qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x" }, "product_reference": "qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64" }, "product_reference": "qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-40896" } ], "notes": [ { "category": "general", "text": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-40896", "url": "https://www.suse.com/security/cve/CVE-2024-40896" }, { "category": "external", "summary": "SUSE Bug 1234812 for CVE-2024-40896", "url": "https://bugzilla.suse.com/1234812" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6Pdf6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6PdfWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineCore6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineQuick6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.s390x", "openSUSE Tumbleweed:libQt6WebEngineWidgets6-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdf-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfquick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-pdfwidgets-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-examples-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webengine-imports-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginecore-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginequick-private-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-devel-6.8.1-2.1.x86_64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.aarch64", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.ppc64le", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.s390x", "openSUSE Tumbleweed:qt6-webenginewidgets-private-devel-6.8.1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-12-29T00:00:00Z", "details": "important" } ], "title": "CVE-2024-40896" } ] }
rhba-2025:6597
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for libxml2 is now available for Red Hat Enterprise Linux 10.", "title": "Topic" }, { "category": "general", "text": "For detailed information on changes in this release, see the Red Hat Enterprise Linux 10 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2025:6597", "url": "https://access.redhat.com/errata/RHBA-2025:6597" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.0_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.0_release_notes/index" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhba-2025_6597.json" } ], "title": "Red Hat Bug Fix Advisory: libxml2 bug fix and enhancement update", "tracking": { "current_release_date": "2025-10-10T00:17:17+00:00", "generator": { "date": "2025-10-10T00:17:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHBA-2025:6597", "initial_release_date": "2025-05-13T07:56:17+00:00", "revision_history": [ { "date": "2025-05-13T07:56:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T07:56:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T00:17:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 10)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product": { "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.12.5-5.el10_0.src", "product": { "name": "libxml2-0:2.12.5-5.el10_0.src", "product_id": "libxml2-0:2.12.5-5.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.12.5-5.el10_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.12.5-5.el10_0.aarch64", "product": { "name": "libxml2-0:2.12.5-5.el10_0.aarch64", "product_id": "libxml2-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "product": { "name": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "product_id": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "product": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "product_id": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product_id": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product_id": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "product": { "name": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "product_id": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-5.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "product": { "name": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "product_id": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-5.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "libxml2-0:2.12.5-5.el10_0.ppc64le", "product_id": "libxml2-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "product_id": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "product_id": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product_id": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product_id": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "product_id": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-5.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "product": { "name": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "product_id": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-5.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.12.5-5.el10_0.x86_64", "product": { "name": "libxml2-0:2.12.5-5.el10_0.x86_64", "product_id": "libxml2-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "product": { "name": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "product_id": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "product": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "product_id": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product_id": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product_id": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "product": { "name": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "product_id": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-5.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "product": { "name": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "product_id": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-5.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.12.5-5.el10_0.s390x", "product": { "name": "libxml2-0:2.12.5-5.el10_0.s390x", "product_id": "libxml2-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "product": { "name": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "product_id": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "product": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "product_id": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product_id": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product_id": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-static-0:2.12.5-5.el10_0.s390x", "product": { "name": "libxml2-static-0:2.12.5-5.el10_0.s390x", "product_id": "libxml2-static-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.12.5-5.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "product": { "name": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "product_id": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-5.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.src" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.src", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.src" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.src", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)", "product_id": "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "BaseOS-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.src" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.src", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-devel-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "libxml2-static-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" }, "product_reference": "python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2024-12-23T18:00:59.670193+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333871" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. In the affected versions of libxml2, the SAX parser can generate events for external entities, even if custom SAX handlers try to override entity content by setting it to \"checked.\" This vulnerability allows classic \u00a0XML External Entity (XXE) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: XXE vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is marked as critical severity instead of important due to its potential to completely compromise system security. By exploiting the XXE vulnerability, an attacker can achieve arbitrary file disclosure (e.g., reading `/etc/passwd`), which exposes sensitive system information and credentials. \n\nIn worst-case scenarios, the flaw can lead to Remote Code Execution (RCE) in misconfigured environments or cause a Denial of Service (DoS) through resource exhaustion. The issue is especially critical because it stems from a broken protection mechanism (due to the renaming of the \"checked\" member), silently leaving downstream applications vulnerable without their knowledge.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40896" }, { "category": "external", "summary": "RHBZ#2333871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40896" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40896", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40896" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761" } ], "release_date": "2024-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T07:56:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2025:6597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "AppStream-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "AppStream-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "BaseOS-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "BaseOS-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.src", "CRB-10.0.GA:libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-debugsource-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-devel-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:libxml2-static-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-0:2.12.5-5.el10_0.x86_64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.aarch64", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.ppc64le", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.s390x", "CRB-10.0.GA:python3-libxml2-debuginfo-0:2.12.5-5.el10_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "libxml2: XXE vulnerability" } ] }
ncsc-2025-0132
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in MySQL", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in Oracle MySQL stellen kwaadwillenden in staat om een denial-of-service-aanval uit te voeren, toegang te krijgen tot gevoelige gegevens of, met voldoende authorisaties de werking van de MySQL server te beinvloeden.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle MySQL", "tracking": { "current_release_date": "2025-04-16T15:11:43.357092Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0132", "initial_release_date": "2025-04-16T15:11:43.357092Z", "revision_history": [ { "date": "2025-04-16T15:11:43.357092Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product": { "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698980", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_workbench:8.0.0-8.0.41:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Workbench" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.1.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.1.0", "product_id": "CSAFPID-2699095", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_connector\\/j:9.0.0-9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698978", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_connector\\/python:9.0.0-9.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Connectors" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=7.6.0|\u003c=7.6.33", "product": { "name": "vers:oracle/\u003e=7.6.0|\u003c=7.6.33", "product_id": "CSAFPID-2699104", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:7.6.0-7.6.33:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product": { "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2699103", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.0-8.0.41:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product": { "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2699102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.0-8.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2699105", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:9.0.0-9.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Cluster" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product": { "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698983", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.0-8.0.41:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product": { "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2698981", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.0-8.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698977", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0-9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/ddl) version 8.4.0", "product": { "name": "vers:oracle/ddl) version 8.4.0", "product_id": "CSAFPID-2699112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/ddl) version 9.0.0", "product": { "name": "vers:oracle/ddl) version 9.0.0", "product_id": "CSAFPID-2699113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product": { "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2699174", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_client:8.0.0-8.0.41:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product": { "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2699172", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_client:8.4.0-8.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2699173", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_client:9.0.0-9.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Client" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product": { "name": "vers:oracle/\u003e=8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698982", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.0-8.0.41:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product": { "name": "vers:oracle/\u003e=8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2698976", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.4.0-8.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698979", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.0-9.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "MySQL Enterprise Backup" } ], "category": "product_family", "name": "Oracle MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:semver/9.0.0|\u003c=9.2.0", "product": { "name": "vers:semver/9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698495" } } ], "category": "product_name", "name": "MySQL Connectors" }, { "branches": [ { "category": "product_version_range", "name": "vers:semver/7.6.0|\u003c=7.6.33", "product": { "name": "vers:semver/7.6.0|\u003c=7.6.33", "product_id": "CSAFPID-2698453" } }, { "category": "product_version_range", "name": "vers:semver/8.0.0|\u003c=8.0.41", "product": { "name": "vers:semver/8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698454" } }, { "category": "product_version_range", "name": "vers:semver/8.4.0|\u003c=8.4.4", "product": { "name": "vers:semver/8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2698455" } }, { "category": "product_version_range", "name": "vers:semver/9.0.0|\u003c=9.2.0", "product": { "name": "vers:semver/9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698456" } } ], "category": "product_name", "name": "MySQL Cluster" }, { "branches": [ { "category": "product_version_range", "name": "vers:semver/8.0.0|\u003c=8.0.41", "product": { "name": "vers:semver/8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698457" } }, { "category": "product_version_range", "name": "vers:semver/8.4.0", "product": { "name": "vers:semver/8.4.0", "product_id": "CSAFPID-2698470" } }, { "category": "product_version_range", "name": "vers:semver/8.4.0|\u003c=8.4.4", "product": { "name": "vers:semver/8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2698458" } }, { "category": "product_version_range", "name": "vers:semver/9.0.0", "product": { "name": "vers:semver/9.0.0", "product_id": "CSAFPID-2698471" } }, { "category": "product_version_range", "name": "vers:semver/9.0.0|\u003c=9.2.0", "product": { "name": "vers:semver/9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698459" } } ], "category": "product_name", "name": "MySQL Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:semver/8.0.0|\u003c=8.0.41", "product": { "name": "vers:semver/8.0.0|\u003c=8.0.41", "product_id": "CSAFPID-2698636" } }, { "category": "product_version_range", "name": "vers:semver/8.4.0|\u003c=8.4.4", "product": { "name": "vers:semver/8.4.0|\u003c=8.4.4", "product_id": "CSAFPID-2698637" } }, { "category": "product_version_range", "name": "vers:semver/9.0.0|\u003c=9.2.0", "product": { "name": "vers:semver/9.0.0|\u003c=9.2.0", "product_id": "CSAFPID-2698638" } } ], "category": "product_name", "name": "MySQL Client" } ], "category": "vendor", "name": "Oracle Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-13176", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "notes": [ { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2024-13176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2024-13176" }, { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40896", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2024-40896" }, { "cve": "CVE-2025-21574", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21574", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21574.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21574" }, { "cve": "CVE-2025-21575", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21575", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21575.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21575" }, { "cve": "CVE-2025-21577", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21577" }, { "cve": "CVE-2025-21579", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21579", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21579.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21579" }, { "cve": "CVE-2025-21580", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21580", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21580.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21580" }, { "cve": "CVE-2025-21581", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21581", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21581.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21581" }, { "cve": "CVE-2025-21583", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21583", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21583.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21583" }, { "cve": "CVE-2025-21584", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21584", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21584.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21584" }, { "cve": "CVE-2025-21585", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21585" }, { "cve": "CVE-2025-21588", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21588", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21588.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-21588" }, { "cve": "CVE-2025-30681", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30681", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30681.json" } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30681" }, { "cve": "CVE-2025-30682", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30682", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30682.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30682" }, { "cve": "CVE-2025-30683", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30683", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30683.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30683" }, { "cve": "CVE-2025-30684", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30684", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30684.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30684" }, { "cve": "CVE-2025-30685", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30685" }, { "cve": "CVE-2025-30687", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30687", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30687.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30687" }, { "cve": "CVE-2025-30688", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30688", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30688.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30688" }, { "cve": "CVE-2025-30689", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30689", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30689.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30689" }, { "cve": "CVE-2025-30693", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30693", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30693.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30693" }, { "cve": "CVE-2025-30695", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30695", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30695.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30695" }, { "cve": "CVE-2025-30696", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30696", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30696.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30696" }, { "cve": "CVE-2025-30699", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30699", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30699.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30699" }, { "cve": "CVE-2025-30703", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30703", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30703.json" } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30703" }, { "cve": "CVE-2025-30704", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30704", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30704.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30704" }, { "cve": "CVE-2025-30705", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30705", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30705.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30705" }, { "cve": "CVE-2025-30706", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30706", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30706.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30706" }, { "cve": "CVE-2025-30710", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30710" }, { "cve": "CVE-2025-30714", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30714", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30714.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30714" }, { "cve": "CVE-2025-30715", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30715", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30715.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30715" }, { "cve": "CVE-2025-30721", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30721", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30721.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30721" }, { "cve": "CVE-2025-30722", "product_status": { "known_affected": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30722", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30722.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-2698980", "CSAFPID-2699095", "CSAFPID-2698978", "CSAFPID-2698495", "CSAFPID-2699104", "CSAFPID-2699103", "CSAFPID-2699102", "CSAFPID-2699105", "CSAFPID-2698453", "CSAFPID-2698454", "CSAFPID-2698455", "CSAFPID-2698456", "CSAFPID-2698983", "CSAFPID-2698981", "CSAFPID-2698977", "CSAFPID-2699112", "CSAFPID-2699113", "CSAFPID-2698457", "CSAFPID-2698470", "CSAFPID-2698458", "CSAFPID-2698471", "CSAFPID-2698459", "CSAFPID-2699174", "CSAFPID-2699172", "CSAFPID-2699173", "CSAFPID-2698636", "CSAFPID-2698637", "CSAFPID-2698638", "CSAFPID-2698982", "CSAFPID-2698976", "CSAFPID-2698979" ] } ], "title": "CVE-2025-30722" } ] }
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)", "title": "CWE-44" }, { "category": "general", "text": "Use of Incorrectly-Resolved Name or Reference", "title": "CWE-706" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "general", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "general", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" }, { "category": "general", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Missing Report of Error Condition", "title": "CWE-392" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "title": "CWE-917" }, { "category": "general", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Divide By Zero", "title": "CWE-369" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2025-04-16T08:39:55.217751Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0124", "initial_release_date": "2025-04-16T08:39:55.217751Z", "revision_history": [ { "date": "2025-04-16T08:39:55.217751Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838578" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-1838586" } } ], "category": "product_name", "name": "Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-1838591" } } ], "category": "product_name", "name": "Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838592" } } ], "category": "product_name", "name": "Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-1838572" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.1", "product": { "name": "vers:unknown/24.2.1", "product_id": "CSAFPID-1838581" } }, { "category": "product_version_range", "name": "vers:unknown/24.2.2", "product": { "name": "vers:unknown/24.2.2", "product_id": "CSAFPID-1838584" } } ], "category": "product_name", "name": "Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=6.0|\u003c=6.1", "product": { "name": "vers:unknown/\u003e=6.0|\u003c=6.1", "product_id": "CSAFPID-2698355" } } ], "category": "product_name", "name": "Communications Unified Assurance" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.3.0", "product": { "name": "vers:unknown/24.3.0", "product_id": "CSAFPID-2698333" } } ], "category": "product_name", "name": "Management Cloud Engine" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.0", "product": { "name": "vers:unknown/24.2.0", "product_id": "CSAFPID-2698334" } } ], "category": "product_name", "name": "Communications Cloud Native Core Network Data Analytics Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.5", "product": { "name": "vers:unknown/24.2.5", "product_id": "CSAFPID-2698374" } } ], "category": "product_name", "name": "Communications Cloud Native Core Network Function Cloud Native Environment" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/9.0.0", "product": { "name": "vers:unknown/9.0.0", "product_id": "CSAFPID-1234193" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.1", "product": { "name": "vers:unknown/9.0.1", "product_id": "CSAFPID-1234261" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.2", "product": { "name": "vers:unknown/9.0.2", "product_id": "CSAFPID-2698362" } }, { "category": "product_version_range", "name": "vers:unknown/9.0.3", "product": { "name": "vers:unknown/9.0.3", "product_id": "CSAFPID-2698358" } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2698372" } } ], "category": "product_name", "name": "Communications Element Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/15.0.0.0.0", "product": { "name": "vers:unknown/15.0.0.0.0", "product_id": "CSAFPID-1837923" } } ], "category": "product_name", "name": "Communications Policy Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2698373" } } ], "category": "product_name", "name": "Communications Session Report Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/9.1.1.9", "product": { "name": "vers:unknown/9.1.1.9", "product_id": "CSAFPID-2698357" } } ], "category": "product_name", "name": "SD-WAN Edge" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/24.2.3", "product": { "name": "vers:unknown/24.2.3", "product_id": "CSAFPID-1838579" } }, { "category": "product_version_range", "name": "vers:unknown/24.3.0", "product": { "name": "vers:unknown/24.3.0", "product_id": "CSAFPID-1838582" } } ], "category": "product_name", "name": "Communications Cloud Native Core Unified Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/10.0.0", "product": { "name": "vers:unknown/10.0.0", "product_id": "CSAFPID-2698381" } }, { "category": "product_version_range", "name": "vers:unknown/9.2.0", "product": { "name": "vers:unknown/9.2.0", "product_id": "CSAFPID-1207518" } }, { "category": "product_version_range", "name": "vers:unknown/9.3.0", "product": { "name": "vers:unknown/9.3.0", "product_id": "CSAFPID-1207704" } } ], "category": "product_name", "name": "Communications Session Border Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/4.1.0", "product": { "name": "vers:unknown/4.1.0", "product_id": "CSAFPID-1207607" } }, { "category": "product_version_range", "name": "vers:unknown/4.2.0", "product": { "name": "vers:unknown/4.2.0", "product_id": "CSAFPID-1207752" } } ], "category": "product_name", "name": "Enterprise Communications Broker" } ], "category": "product_family", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839911", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839908", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-2698963", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698973", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.4", "product": { "name": "vers:oracle/24.2.4", "product_id": "CSAFPID-2699085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839941", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core DBTier" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2", "product_id": "CSAFPID-1839907", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4", "product": { "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4", "product_id": "CSAFPID-2698965", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4", "product": { "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4", "product_id": "CSAFPID-2698944", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839952", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-2699038", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Certificate Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839951", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-2699059", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839919", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698957", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Repository Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1839924", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839910", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1839909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839894", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2698958", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2699094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839934", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-2699086", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839935", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/25.1.100", "product": { "name": "vers:oracle/25.1.100", "product_id": "CSAFPID-2699073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Service Communication Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/46.6", "product": { "name": "vers:oracle/46.6", "product_id": "CSAFPID-2698993", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications EAGLE Element Management System" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/5.1", "product": { "name": "vers:oracle/5.1", "product_id": "CSAFPID-1839893", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/5.2", "product": { "name": "vers:oracle/5.2", "product_id": "CSAFPID-1839895", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Operations Monitor" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.11", "product": { "name": "vers:oracle/12.11", "product_id": "CSAFPID-1839890", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.0", "product": { "name": "vers:oracle/14.0", "product_id": "CSAFPID-1839891", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.0.0", "product": { "name": "vers:oracle/14.0.0", "product_id": "CSAFPID-2699072", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0", "product": { "name": "vers:oracle/15.0", "product_id": "CSAFPID-1839961", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0", "product": { "name": "vers:oracle/15.0.0", "product_id": "CSAFPID-2699023", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1", "product": { "name": "vers:oracle/15.0.1", "product_id": "CSAFPID-2699025", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.2", "product": { "name": "vers:oracle/15.0.2", "product_id": "CSAFPID-2699024", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications User Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0.0", "product": { "name": "vers:oracle/9.0.0.0", "product_id": "CSAFPID-2698999", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Diameter Signaling Router" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2698996", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Management Cloud Engine" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-2699007", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Data Analytics Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1839868", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.5", "product": { "name": "vers:oracle/24.2.5", "product_id": "CSAFPID-2699029", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839869", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0", "product": { "name": "vers:oracle/9.0.0", "product_id": "CSAFPID-2699013", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.1", "product": { "name": "vers:oracle/9.0.1", "product_id": "CSAFPID-2699012", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.2", "product": { "name": "vers:oracle/9.0.2", "product_id": "CSAFPID-2699016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.3", "product": { "name": "vers:oracle/9.0.3", "product_id": "CSAFPID-2699015", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2699098", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Element Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-1839960", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Policy Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.0.0", "product": { "name": "vers:oracle/9.0.0", "product_id": "CSAFPID-2699093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.1", "product": { "name": "vers:oracle/9.0.1", "product_id": "CSAFPID-2699092", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.2", "product": { "name": "vers:oracle/9.0.2", "product_id": "CSAFPID-2699091", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.0.3", "product": { "name": "vers:oracle/9.0.3", "product_id": "CSAFPID-2699090", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product": { "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3", "product_id": "CSAFPID-2699124", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Session Report Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/9.1.1.9", "product": { "name": "vers:oracle/9.1.1.9", "product_id": "CSAFPID-2698959", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle SD-WAN Edge" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/22.4.0", "product": { "name": "vers:oracle/22.4.0", "product_id": "CSAFPID-2699181", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/23.4.4", "product": { "name": "vers:oracle/23.4.4", "product_id": "CSAFPID-1839930", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.1", "product": { "name": "vers:oracle/24.1.1", "product_id": "CSAFPID-1839933", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.2", "product": { "name": "vers:oracle/24.2.2", "product_id": "CSAFPID-1839931", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.3", "product": { "name": "vers:oracle/24.2.3", "product_id": "CSAFPID-1839963", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-1839932", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/25.1.100", "product": { "name": "vers:oracle/25.1.100", "product_id": "CSAFPID-2698956", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0", "product": { "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0", "product_id": "CSAFPID-2699180", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Unified Data Repository" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/10.0.0", "product": { "name": "vers:oracle/10.0.0", "product_id": "CSAFPID-2699083", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.2.0", "product": { "name": "vers:oracle/9.2.0", "product_id": "CSAFPID-1839887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/9.3.0", "product": { "name": "vers:oracle/9.3.0", "product_id": "CSAFPID-1839889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Session Border Controller" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/4.1.0", "product": { "name": "vers:oracle/4.1.0", "product_id": "CSAFPID-1839888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/4.2.0", "product": { "name": "vers:oracle/4.2.0", "product_id": "CSAFPID-1839886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Enterprise Communications Broker" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1839925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1840027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.3.0", "product": { "name": "vers:oracle/24.3.0", "product_id": "CSAFPID-2699041", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0", "product": { "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0", "product_id": "CSAFPID-2698961", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Analytics Data Director" } ], "category": "product_family", "name": "Oracle Communications" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1", "product_id": "CSAFPID-1145869" } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3", "product_id": "CSAFPID-1145271", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5", "product_id": "CSAFPID-1173947", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Binding Support Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2", "product_id": "CSAFPID-1145868" } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4", "product_id": "CSAFPID-1145270", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6", "product": { "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6", "product_id": "CSAFPID-1173946", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Policy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.3", "product": { "name": "vers:oracle/23.4.3", "product_id": "CSAFPID-1173942", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173945", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Certificate Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.2", "product": { "name": "vers:oracle/23.4.2", "product_id": "CSAFPID-1173940", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173941", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Console" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.4", "product": { "name": "vers:oracle/23.4.4", "product_id": "CSAFPID-1173965", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.1", "product": { "name": "vers:oracle/24.2.1", "product_id": "CSAFPID-1173967", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Repository Function" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.2", "product": { "name": "vers:oracle/23.4.2", "product_id": "CSAFPID-1173943", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1173944", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1145265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1145273", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.2.0", "product": { "name": "vers:oracle/24.2.0", "product_id": "CSAFPID-1174046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Service Communication Proxy" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.3.6", "product": { "name": "vers:oracle/7.3.6", "product_id": "CSAFPID-2699077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.0", "product": { "name": "vers:oracle/7.4.0", "product_id": "CSAFPID-2699075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-2699076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Integrity" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/6.0", "product": { "name": "vers:oracle/6.0", "product_id": "CSAFPID-2699027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5", "product": { "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5", "product_id": "CSAFPID-1839852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5", "product": { "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5", "product_id": "CSAFPID-1840033", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=6.0|\u003c=6.1", "product": { "name": "vers:oracle/\u003e=6.0|\u003c=6.1", "product_id": "CSAFPID-2698955", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Unified Assurance" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.0.0.8.0", "product": { "name": "vers:oracle/12.0.0.8.0", "product_id": "CSAFPID-2699001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699084", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product": { "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product_id": "CSAFPID-2699058", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8", "product": { "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8", "product_id": "CSAFPID-1839957", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0", "product": { "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0", "product_id": "CSAFPID-2699000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1", "product": { "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1", "product_id": "CSAFPID-1839953", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Billing and Revenue Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.1.0.26.0", "product": { "name": "vers:oracle/8.1.0.26.0", "product_id": "CSAFPID-2698964", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Messaging Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/6.3.1", "product": { "name": "vers:oracle/6.3.1", "product_id": "CSAFPID-2698991", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications MetaSolv Solution" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.0.6.0.0", "product": { "name": "vers:oracle/12.0.6.0.0", "product_id": "CSAFPID-2699127", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699126", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699128", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Network Charging and Control" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.4.0", "product": { "name": "vers:oracle/7.4.0", "product_id": "CSAFPID-1839980", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-1840004", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.1", "product": { "name": "vers:oracle/7.4.1", "product_id": "CSAFPID-1839981", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Order and Service Management" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/15.0.0.0.0", "product": { "name": "vers:oracle/15.0.0.0.0", "product_id": "CSAFPID-2699056", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/15.0.1.0.0", "product": { "name": "vers:oracle/15.0.1.0.0", "product_id": "CSAFPID-2699063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product": { "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0", "product_id": "CSAFPID-2699060", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Pricing Design Center" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.0.0.3", "product": { "name": "vers:oracle/8.0.0.3", "product_id": "CSAFPID-1839921", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.0.0.4.0", "product": { "name": "vers:oracle/8.0.0.4.0", "product_id": "CSAFPID-2698975", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.0.1", "product": { "name": "vers:oracle/8.1.0.1", "product_id": "CSAFPID-1839922", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/8.1.0.2.0", "product": { "name": "vers:oracle/8.1.0.2.0", "product_id": "CSAFPID-2698974", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Service Catalog and Design" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/7.4.1", "product": { "name": "vers:oracle/7.4.1", "product_id": "CSAFPID-1839978", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.4.2", "product": { "name": "vers:oracle/7.4.2", "product_id": "CSAFPID-1839979", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.0", "product": { "name": "vers:oracle/7.5.0", "product_id": "CSAFPID-2699035", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.5.1", "product": { "name": "vers:oracle/7.5.1", "product_id": "CSAFPID-1839983", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.6.0", "product": { "name": "vers:oracle/7.6.0", "product_id": "CSAFPID-1840005", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/7.7.0", "product": { "name": "vers:oracle/7.7.0", "product_id": "CSAFPID-2699034", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2", "product": { "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2", "product_id": "CSAFPID-2699036", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1", "product": { "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1", "product_id": "CSAFPID-2699096", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Unified Inventory Management" } ], "category": "product_family", "name": "Oracle Communications Applications" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/23.4.0", "product": { "name": "vers:oracle/23.4.0", "product_id": "CSAFPID-1145246", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/24.1.0", "product": { "name": "vers:oracle/24.1.0", "product_id": "CSAFPID-1145247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:semver/7.4.0", "product": { "name": "vers:semver/7.4.0", "product_id": "CSAFPID-2698653" } }, { "category": "product_version_range", "name": "vers:semver/7.4.1", "product": { "name": "vers:semver/7.4.1", "product_id": "CSAFPID-2698654" } }, { "category": "product_version_range", "name": "vers:semver/7.5.0", "product": { "name": "vers:semver/7.5.0", "product_id": "CSAFPID-2698655" } } ], "category": "product_name", "name": "Oracle Communications Order and Service Management" } ], "category": "vendor", "name": "Oracle Corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5388", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5388", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-5388" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-49582", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49582", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-49582" }, { "cve": "CVE-2023-51074", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2023-51074" }, { "cve": "CVE-2024-1135", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-1135" }, { "cve": "CVE-2024-4227", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4227", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-4227" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-6763", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json" } ], "title": "CVE-2024-6763" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-12797", "cwe": { "id": "CWE-392", "name": "Missing Report of Error Condition" }, "notes": [ { "category": "other", "text": "Missing Report of Error Condition", "title": "CWE-392" }, { "category": "other", "text": "Dependency on Vulnerable Third-Party Component", "title": "CWE-1395" }, { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12797", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-12797" }, { "cve": "CVE-2024-12798", "cwe": { "id": "CWE-917", "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)", "title": "CWE-917" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-12798", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-12798" }, { "cve": "CVE-2024-21538", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21538", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-21538" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-28168", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28168" }, { "cve": "CVE-2024-28219", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "other", "text": "Use of Potentially Dangerous Function", "title": "CWE-676" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28219", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28219" }, { "cve": "CVE-2024-28834", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28834", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-28834" }, { "cve": "CVE-2024-31141", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31141", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-31141" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-35195", "cwe": { "id": "CWE-670", "name": "Always-Incorrect Control Flow Implementation" }, "notes": [ { "category": "other", "text": "Always-Incorrect Control Flow Implementation", "title": "CWE-670" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-35195" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38827", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38827", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-38827" }, { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40896", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-40896" }, { "cve": "CVE-2024-43044", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-43044" }, { "cve": "CVE-2024-43709", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43709", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json" } ], "title": "CVE-2024-43709" }, { "cve": "CVE-2024-43796", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43796", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-43796" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-49767", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-49767", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-49767" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52046", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-52046" }, { "cve": "CVE-2024-52303", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52303", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-52303" }, { "cve": "CVE-2024-53122", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Divide By Zero", "title": "CWE-369" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-53122", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-53122" }, { "cve": "CVE-2024-56128", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "notes": [ { "category": "other", "text": "Incorrect Implementation of Authentication Algorithm", "title": "CWE-303" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-56128" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2024-57699", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2024-57699", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2024-57699" }, { "cve": "CVE-2025-1974", "cwe": { "id": "CWE-653", "name": "Improper Isolation or Compartmentalization" }, "notes": [ { "category": "other", "text": "Improper Isolation or Compartmentalization", "title": "CWE-653" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-1974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-1974" }, { "cve": "CVE-2025-23084", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23084", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-23084" }, { "cve": "CVE-2025-23184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json" } ], "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)", "title": "CWE-44" }, { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Use of Incorrectly-Resolved Name or Reference", "title": "CWE-706" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24813", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24813" }, { "cve": "CVE-2025-24928", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24928", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24928" }, { "cve": "CVE-2025-24970", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27516", "cwe": { "id": "CWE-1336", "name": "Improper Neutralization of Special Elements Used in a Template Engine" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27516", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json" } ], "title": "CVE-2025-27516" }, { "cve": "CVE-2025-27789", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27789", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-27789" }, { "cve": "CVE-2025-30729", "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30729", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-30729" }, { "cve": "CVE-2025-31721", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31721", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1838578", "CSAFPID-1839911", "CSAFPID-1839908", "CSAFPID-1145869", "CSAFPID-1145271", "CSAFPID-1173947", "CSAFPID-2698963", "CSAFPID-2698973", "CSAFPID-2699085", "CSAFPID-1839941", "CSAFPID-1838591", "CSAFPID-1145868", "CSAFPID-1145270", "CSAFPID-1173946", "CSAFPID-1839907", "CSAFPID-2698965", "CSAFPID-2698944", "CSAFPID-1173942", "CSAFPID-1173945", "CSAFPID-1839952", "CSAFPID-2699038", "CSAFPID-1838592", "CSAFPID-1173940", "CSAFPID-1173941", "CSAFPID-1839951", "CSAFPID-2699059", "CSAFPID-1173965", "CSAFPID-1173967", "CSAFPID-1839919", "CSAFPID-2698957", "CSAFPID-1838572", "CSAFPID-1838581", "CSAFPID-1838584", "CSAFPID-1839924", "CSAFPID-1173943", "CSAFPID-1173944", "CSAFPID-1839910", "CSAFPID-1839909", "CSAFPID-1839894", "CSAFPID-2698958", "CSAFPID-2699094", "CSAFPID-1145265", "CSAFPID-1145273", "CSAFPID-1174046", "CSAFPID-1839934", "CSAFPID-2699086", "CSAFPID-1839935", "CSAFPID-2699073", "CSAFPID-2698993", "CSAFPID-1839893", "CSAFPID-1839895", "CSAFPID-1839890", "CSAFPID-1839891", "CSAFPID-2699072", "CSAFPID-1839961", "CSAFPID-2699023", "CSAFPID-2699025", "CSAFPID-2699024", "CSAFPID-2698999", "CSAFPID-2699077", "CSAFPID-2699075", "CSAFPID-2699076", "CSAFPID-2698355", "CSAFPID-2699027", "CSAFPID-1839852", "CSAFPID-1840033", "CSAFPID-2698955", "CSAFPID-2699001", "CSAFPID-2699084", "CSAFPID-2699079", "CSAFPID-2699058", "CSAFPID-1839957", "CSAFPID-2699000", "CSAFPID-1839953", "CSAFPID-2698964", "CSAFPID-2698991", "CSAFPID-2699127", "CSAFPID-2699126", "CSAFPID-2699128", "CSAFPID-1839980", "CSAFPID-1840004", "CSAFPID-1839981", "CSAFPID-2698653", "CSAFPID-2698654", "CSAFPID-2698655", "CSAFPID-2699056", "CSAFPID-2699063", "CSAFPID-2699060", "CSAFPID-1839921", "CSAFPID-2698975", "CSAFPID-1839922", "CSAFPID-2698974", "CSAFPID-1839978", "CSAFPID-1839979", "CSAFPID-2699035", "CSAFPID-1839983", "CSAFPID-1840005", "CSAFPID-2699034", "CSAFPID-2699036", "CSAFPID-2699096", "CSAFPID-2698996", "CSAFPID-2698333", "CSAFPID-2698334", "CSAFPID-2699007", "CSAFPID-2698374", "CSAFPID-1145246", "CSAFPID-1145247", "CSAFPID-1839868", "CSAFPID-2699029", "CSAFPID-1839869", "CSAFPID-1234193", "CSAFPID-1234261", "CSAFPID-2698362", "CSAFPID-2698358", "CSAFPID-2698372", "CSAFPID-2699013", "CSAFPID-2699012", "CSAFPID-2699016", "CSAFPID-2699015", "CSAFPID-2699098", "CSAFPID-1837923", "CSAFPID-1839960", "CSAFPID-2698373", "CSAFPID-2699093", "CSAFPID-2699092", "CSAFPID-2699091", "CSAFPID-2699090", "CSAFPID-2699124", "CSAFPID-2698959", "CSAFPID-2698357", "CSAFPID-1838579", "CSAFPID-1838582", "CSAFPID-2699181", "CSAFPID-1839930", "CSAFPID-1839933", "CSAFPID-1839931", "CSAFPID-1839963", "CSAFPID-1839932", "CSAFPID-2698956", "CSAFPID-2699180", "CSAFPID-2698381", "CSAFPID-1207518", "CSAFPID-1207704", "CSAFPID-2699083", "CSAFPID-1839887", "CSAFPID-1839889", "CSAFPID-1207607", "CSAFPID-1207752", "CSAFPID-1839888", "CSAFPID-1839886", "CSAFPID-1839925", "CSAFPID-1840027", "CSAFPID-2699041", "CSAFPID-2698961", "CSAFPID-1838586" ] } ], "title": "CVE-2025-31721" } ] }
ncsc-2025-0128
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft meerdere kwetsbaarheden verholpen in verschillende producten, waaronder de Utilities Application Framework, WebLogic Server, en Fusion Middleware.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om toegang te krijgen tot kritieke gegevens, Denial-of-Service (DoS) te veroorzaken, en in sommige gevallen zelfs volledige controle over systemen te verkrijgen. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal vervaardigde verzoeken te sturen of door gebruik te maken van onveilige configuraties in de getroffen producten.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware", "tracking": { "current_release_date": "2025-04-16T15:01:24.587426Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0128", "initial_release_date": "2025-04-16T15:01:24.587426Z", "revision_history": [ { "date": "2025-04-16T15:01:24.587426Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2699078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Access Manager" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698989", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_process_management_suite:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Business Process Management Suite" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839864", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698967", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:http_server:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839938", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699074", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:managed_file_transfer:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Managed File Transfer" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698998", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:soa_suite:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2698997", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:soa_suite:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle SOA Suite" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839896", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1839897", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-1840030", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebLogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/8.5.7", "product": { "name": "vers:oracle/8.5.7", "product_id": "CSAFPID-1839872", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Outside In Technology" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840014", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1839982", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699125", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1839988", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Fusion Middleware MapViewer" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698948", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle JDeveloper" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-2699057", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_forms_recognition:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Forms Recognition" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840006", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2698985", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Data Integrator" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1840028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.2.0.0", "product": { "name": "vers:oracle/14.1.2.0.0", "product_id": "CSAFPID-2699064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:14.1.2.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Business Activity Monitoring" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-2699044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:service_bus:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle Service Bus" } ], "category": "product_family", "name": "Oracle Fusion Middleware" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1213401" } } ], "category": "product_name", "name": "Managed File Transfer" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-1536644" } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1536288" } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-1536278" } } ], "category": "product_name", "name": "Weblogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/8.5.7", "product": { "name": "vers:unknown/8.5.7", "product_id": "CSAFPID-1233360" } } ], "category": "product_name", "name": "Outside In Technology" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1210435" } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-1210304" } } ], "category": "product_name", "name": "Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1247956" } } ], "category": "product_name", "name": "Jdeveloper (Application)" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-1214253" } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1232894" } } ], "category": "product_name", "name": "WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-1201529" } } ], "category": "product_name", "name": "Data Integrator" } ], "category": "product_family", "name": "Oracle" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1144680", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:oracle/14.1.1.0.0", "product": { "name": "vers:oracle/14.1.1.0.0", "product_id": "CSAFPID-1144604", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebLogic Server" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-39413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/14.1.1.0.0", "product": { "name": "vers:unknown/14.1.1.0.0", "product_id": "CSAFPID-39412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Coherence" }, { "branches": [ { "category": "product_version_range", "name": "vers:oracle/12.2.1.3.0", "product": { "name": "vers:oracle/12.2.1.3.0", "product_id": "CSAFPID-1144910" } }, { "category": "product_version_range", "name": "vers:oracle/12.2.1.4.0", "product": { "name": "vers:oracle/12.2.1.4.0", "product_id": "CSAFPID-1144911", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "Oracle WebCenter Portal" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/12.2.1.3.0", "product": { "name": "vers:unknown/12.2.1.3.0", "product_id": "CSAFPID-317201", "product_identification_helper": { "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/12.2.1.4.0", "product": { "name": "vers:unknown/12.2.1.4.0", "product_id": "CSAFPID-307786", "product_identification_helper": { "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*" } } } ], "category": "product_name", "name": "WebCenter Portal" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-13936", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2020-13936", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13936.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2020-13936" }, { "cve": "CVE-2020-25649", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2020-25649", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-25649.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2020-25649" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26464", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26464.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2023-26464" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-9143", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json" } ], "title": "CVE-2024-9143" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-11612", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-11612", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11612.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-11612" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-28168", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-28168" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-40896", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40896", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-40896" }, { "cve": "CVE-2024-47072", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47072" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-50602", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-50602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-50602" }, { "cve": "CVE-2024-52046", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-52046", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-52046" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-23184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-23184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json" } ], "title": "CVE-2025-23184" }, { "cve": "CVE-2025-24970", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2025-24970" }, { "cve": "CVE-2025-27363", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27363", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H", "version": "3.1" }, "products": [ "CSAFPID-2699078", "CSAFPID-1839842", "CSAFPID-2698989", "CSAFPID-1839864", "CSAFPID-2698967", "CSAFPID-1213401", "CSAFPID-1839938", "CSAFPID-2699074", "CSAFPID-2698998", "CSAFPID-2698997", "CSAFPID-1144680", "CSAFPID-1839896", "CSAFPID-1144604", "CSAFPID-1839897", "CSAFPID-1536644", "CSAFPID-1840030", "CSAFPID-1536288", "CSAFPID-1536278", "CSAFPID-1839872", "CSAFPID-1233360", "CSAFPID-39413", "CSAFPID-1210435", "CSAFPID-1210304", "CSAFPID-39412", "CSAFPID-1840014", "CSAFPID-1839982", "CSAFPID-2699125", "CSAFPID-1839988", "CSAFPID-1247956", "CSAFPID-2698948", "CSAFPID-2699057", "CSAFPID-1144910", "CSAFPID-1840006", "CSAFPID-1144911", "CSAFPID-1214253", "CSAFPID-317201", "CSAFPID-1232894", "CSAFPID-307786", "CSAFPID-1201529", "CSAFPID-2698985", "CSAFPID-1840028", "CSAFPID-2699064", "CSAFPID-2699044" ] } ], "title": "CVE-2025-27363" } ] }
wid-sec-w-2024-3746
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "libxml ist ein C Parser und Toolkit, welches f\u00fcr das Gnome Projekt entwickelt wurde.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libxml2 ausnutzen, um Dateien zu manipulieren oder einen Denial of Service zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3746 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3746.json" }, { "category": "self", "summary": "WID-SEC-2024-3746 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3746" }, { "category": "external", "summary": "Red Hat Bugtracker vom 2024-12-23", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333871" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-12-23", "url": "https://github.com/advisories/GHSA-6c2p-rqx3-w4px" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-867A14DE12 vom 2024-12-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-867a14de12" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-9F3765A04B vom 2024-12-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-9f3765a04b" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14611-1 vom 2024-12-30", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNFRSHS45PIJOVDOQPX33OOOOBMDTP7F/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7215-1 vom 2025-01-16", "url": "https://ubuntu.com/security/notices/USN-7215-1" } ], "source_lang": "en-US", "title": "libxml2: Schwachstelle erm\u00f6glicht XXE Angriffe", "tracking": { "current_release_date": "2025-01-16T23:00:00.000+00:00", "generator": { "date": "2025-01-17T09:13:19.321+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3746", "initial_release_date": "2024-12-23T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-23T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-12-30T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-01-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.11.9", "product": { "name": "Open Source libxml2 \u003c2.11.9", "product_id": "T039969" } }, { "category": "product_version", "name": "2.11.9", "product": { "name": "Open Source libxml2 2.11.9", "product_id": "T039969-fixed", "product_identification_helper": { "cpe": "cpe:/a:xmlsoft:libxml2:2.11.9" } } }, { "category": "product_version_range", "name": "\u003c2.12.9", "product": { "name": "Open Source libxml2 \u003c2.12.9", "product_id": "T039970" } }, { "category": "product_version", "name": "2.12.9", "product": { "name": "Open Source libxml2 2.12.9", "product_id": "T039970-fixed", "product_identification_helper": { "cpe": "cpe:/a:xmlsoft:libxml2:2.12.9" } } }, { "category": "product_version_range", "name": "\u003c2.13.3", "product": { "name": "Open Source libxml2 \u003c2.13.3", "product_id": "T039971" } }, { "category": "product_version", "name": "2.13.3", "product": { "name": "Open Source libxml2 2.13.3", "product_id": "T039971-fixed", "product_identification_helper": { "cpe": "cpe:/a:xmlsoft:libxml2:2.13.3" } } } ], "category": "product_name", "name": "libxml2" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40896", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in libxml2. Der SAX-Parser kann Ereignisse f\u00fcr externe Entit\u00e4ten erzeugen, selbst wenn benutzerdefinierte SAX-Handler versuchen, den Inhalt der Entit\u00e4t zu \u00fcberschreiben, was XXE-Angriffe m\u00f6glich macht. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T000126", "T039969", "T027843", "T039971", "T039970", "74185" ] }, "release_date": "2024-12-23T23:00:00.000+00:00", "title": "CVE-2024-40896" } ] }
wid-sec-w-2025-0813
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0813 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0813.json" }, { "category": "self", "summary": "WID-SEC-2025-0813 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0813" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2025 - Appendix Oracle MySQL vom 2025-04-15", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7479-1 vom 2025-05-05", "url": "https://ubuntu.com/security/notices/USN-7479-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7519-1 vom 2025-05-20", "url": "https://ubuntu.com/security/notices/USN-7519-1" }, { "category": "external", "summary": "IBM Security Bulletin 7235067 vom 2025-05-29", "url": "https://www.ibm.com/support/pages/node/7235067" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7548-1 vom 2025-06-03", "url": "https://ubuntu.com/security/notices/USN-7548-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-4208 vom 2025-06-04", "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00005.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250418-0005 vom 2025-09-11", "url": "https://security.netapp.com/advisory/NTAP-20250418-0005" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:15699 vom 2025-09-11", "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250502-0006 vom 2025-09-11", "url": "https://security.netapp.com/advisory/NTAP-20250502-0006" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-15699 vom 2025-09-13", "url": "http://linux.oracle.com/errata/ELSA-2025-15699.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16046 vom 2025-09-17", "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:16086 vom 2025-09-17", "url": "https://access.redhat.com/errata/RHSA-2025:16086" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-17T22:00:00.000+00:00", "generator": { "date": "2025-09-18T07:01:12.047+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0813", "initial_release_date": "2025-04-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-05-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-09-11T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von NetApp und Red Hat aufgenommen" }, { "date": "2025-09-14T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "branches": [ { "category": "product_version", "name": "8.4.0", "product": { "name": "Oracle MySQL 8.4.0", "product_id": "1640751", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.4.0" } } }, { "category": "product_version", "name": "9.0.0", "product": { "name": "Oracle MySQL 9.0.0", "product_id": "1672260", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:9.0.0" } } }, { "category": "product_version", "name": "8.0.0-8.0.41", "product": { "name": "Oracle MySQL 8.0.0-8.0.41", "product_id": "T042893", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.0.0_-_8.0.41" } } }, { "category": "product_version", "name": "9.0.0-9.2.0", "product": { "name": "Oracle MySQL 9.0.0-9.2.0", "product_id": "T042894", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:9.0.0_-_9.2.0" } } }, { "category": "product_version", "name": "9.0.0-9.1.0", "product": { "name": "Oracle MySQL 9.0.0-9.1.0", "product_id": "T042895", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:9.0.0_-_9.1.0" } } }, { "category": "product_version", "name": "7.6.0-7.6.33", "product": { "name": "Oracle MySQL 7.6.0-7.6.33", "product_id": "T042896", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:7.6.0_-_7.6.33" } } }, { "category": "product_version", "name": "8.4.0-8.4.4", "product": { "name": "Oracle MySQL 8.4.0-8.4.4", "product_id": "T042897", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.4.0_-_8.4.4" } } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-13176", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-13176" }, { "cve": "CVE-2024-40896", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-40896" }, { "cve": "CVE-2024-7254", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2024-7254" }, { "cve": "CVE-2025-21574", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21574" }, { "cve": "CVE-2025-21575", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21575" }, { "cve": "CVE-2025-21577", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21577" }, { "cve": "CVE-2025-21579", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21579" }, { "cve": "CVE-2025-21580", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21580" }, { "cve": "CVE-2025-21581", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21581" }, { "cve": "CVE-2025-21583", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21583" }, { "cve": "CVE-2025-21584", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21584" }, { "cve": "CVE-2025-21585", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21585" }, { "cve": "CVE-2025-21588", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-21588" }, { "cve": "CVE-2025-30681", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30681" }, { "cve": "CVE-2025-30682", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30682" }, { "cve": "CVE-2025-30683", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30683" }, { "cve": "CVE-2025-30684", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30684" }, { "cve": "CVE-2025-30685", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30685" }, { "cve": "CVE-2025-30687", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30687" }, { "cve": "CVE-2025-30688", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30688" }, { "cve": "CVE-2025-30689", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30689" }, { "cve": "CVE-2025-30693", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30693" }, { "cve": "CVE-2025-30695", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30695" }, { "cve": "CVE-2025-30696", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30696" }, { "cve": "CVE-2025-30699", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30699" }, { "cve": "CVE-2025-30703", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30703" }, { "cve": "CVE-2025-30704", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30704" }, { "cve": "CVE-2025-30705", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30705" }, { "cve": "CVE-2025-30706", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30706" }, { "cve": "CVE-2025-30710", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30710" }, { "cve": "CVE-2025-30714", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30714" }, { "cve": "CVE-2025-30715", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30715" }, { "cve": "CVE-2025-30721", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30721" }, { "cve": "CVE-2025-30722", "product_status": { "known_affected": [ "T025152", "67646", "T004914", "T042893", "T042894", "T042895", "T042896", "2951", "T042897", "T000126", "5104", "T025631", "1640751", "1672260" ] }, "release_date": "2025-04-15T22:00:00.000+00:00", "title": "CVE-2025-30722" } ] }
CERTFR-2025-AVI-0600
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Oracle | Java SE | Oracle GraalVM Enterprise Edition version 21.3.14 | ||
Oracle | Java SE | Oracle Java SE version 17.0.15 | ||
Oracle | Java SE | Oracle GraalVM for JDK version 17.0.15 | ||
Oracle | Java SE | Oracle Java SE version 24.0.1 | ||
Oracle | Java SE | Oracle Java SE version 11.0.27 | ||
Oracle | Java SE | Oracle Java SE version 8u451-b50 | ||
Oracle | Java SE | Oracle Java SE version 21.0.7 | ||
Oracle | Java SE | Oracle Java SE version 8u451 | ||
Oracle | Java SE | Oracle GraalVM for JDK version 24.0.1 | ||
Oracle | Java SE | Oracle Java SE version 8u451-perf | ||
Oracle | Java SE | Oracle GraalVM for JDK version 21.0.7 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Oracle GraalVM Enterprise Edition version 21.3.14", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 17.0.15", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle GraalVM for JDK version 17.0.15", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 24.0.1", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 11.0.27", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 8u451-b50", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 21.0.7", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 8u451", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle GraalVM for JDK version 24.0.1", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle Java SE version 8u451-perf", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "Oracle GraalVM for JDK version 21.0.7", "product": { "name": "Java SE", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106" }, { "name": "CVE-2025-30754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754" }, { "name": "CVE-2025-50063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50063" }, { "name": "CVE-2025-50065", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50065" }, { "name": "CVE-2025-23165", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165" }, { "name": "CVE-2025-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059" }, { "name": "CVE-2025-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30761" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2025-23166", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2025-32415", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415" }, { "name": "CVE-2025-24855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855" }, { "name": "CVE-2025-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749" }, { "name": "CVE-2025-32414", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414" }, { "name": "CVE-2024-40896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40896" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-30752", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30752" } ], "initial_release_date": "2025-07-18T00:00:00", "last_revision_date": "2025-07-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0600", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE", "vendor_advisories": [ { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle Java SE cpujul2025", "url": "https://www.oracle.com/security-alerts/cpujul2025.html" } ] }
CERTFR-2025-AVI-0329
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Nessus versions ant\u00e9rieures \u00e0 10.8.4", "product": { "name": "Nessus", "vendor": { "name": "Tenable", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2025-36625", "url": "https://www.cve.org/CVERecord?id=CVE-2025-36625" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2025-24914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24914" }, { "name": "CVE-2024-50602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602" }, { "name": "CVE-2024-40896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40896" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" } ], "initial_release_date": "2025-04-18T00:00:00", "last_revision_date": "2025-04-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0329", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus", "vendor_advisories": [ { "published_at": "2025-04-18", "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-05", "url": "https://www.tenable.com/security/tns-2025-05" } ] }
CERTFR-2025-AVI-0320
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Oracle | MySQL | MySQL Server (InnoDB) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: UDF) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Components Services) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: DDL) version 9.0.0 | ||
Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Components Services) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Parser) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Components Services) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Optimizer) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Stored Procedure) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: DML) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: DML) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Replication) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Packaging) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Parser) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Packaging) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: PS) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Parser) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: DDL) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: DML) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Stored Procedure) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.0 | ||
Oracle | MySQL | MySQL Server (Server: PS) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Connectors (Connector/C++) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Connectors (Connector/J) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Optimizer) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Connectors (Connector/ODBC) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: DDL) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Replication) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: Optimizer) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (InnoDB) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Options) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Packaging) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Options) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Replication) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.33 | ||
Oracle | MySQL | MySQL Server (Server: UDF) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Client (Client: mysqldump) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: Stored Procedure) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Client (Client: mysqldump) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: DDL) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (Server: PS) versions 8.4.0 à 8.4.4 | ||
Oracle | MySQL | MySQL Server (Server: UDF) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Server (Server: Options) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Server (InnoDB) versions 8.0.0 à 8.0.41 | ||
Oracle | MySQL | MySQL Connectors (Connector/J) versions 9.0.0 à 9.1.0 | ||
Oracle | MySQL | MySQL Connectors (Connector/Python) versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.2.0 | ||
Oracle | MySQL | MySQL Client (Client: mysqldump) versions 9.0.0 à 9.2.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "MySQL Server (InnoDB) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: UDF) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Components Services) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DDL) version 9.0.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Components Services) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Parser) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Components Services) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Optimizer) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Stored Procedure) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DML) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DML) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Replication) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Packaging) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Parser) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Packaging) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: PS) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Parser) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DDL) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DML) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Stored Procedure) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DDL) version 8.4.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: PS) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors (Connector/C++) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors (Connector/J) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Optimizer) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors (Connector/ODBC) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DDL) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Replication) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Optimizer) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (InnoDB) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Options) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Packaging) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Options) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Replication) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.33", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: UDF) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Client (Client: mysqldump) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Stored Procedure) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Client (Client: mysqldump) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: DDL) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: PS) versions 8.4.0 \u00e0 8.4.4", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: UDF) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (Server: Options) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Server (InnoDB) versions 8.0.0 \u00e0 8.0.41", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors (Connector/J) versions 9.0.0 \u00e0 9.1.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Connectors (Connector/Python) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } }, { "description": "MySQL Client (Client: mysqldump) versions 9.0.0 \u00e0 9.2.0", "product": { "name": "MySQL", "vendor": { "name": "Oracle", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-30681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681" }, { "name": "CVE-2025-30710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30710" }, { "name": "CVE-2025-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689" }, { "name": "CVE-2025-30715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715" }, { "name": "CVE-2025-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682" }, { "name": "CVE-2025-30703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703" }, { "name": "CVE-2025-30706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30706" }, { "name": "CVE-2025-30696", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696" }, { "name": "CVE-2025-21584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-30683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683" }, { "name": "CVE-2025-30699", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699" }, { "name": "CVE-2025-21574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574" }, { "name": "CVE-2025-21580", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580" }, { "name": "CVE-2025-21575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575" }, { "name": "CVE-2025-30714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30714" }, { "name": "CVE-2025-21577", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577" }, { "name": "CVE-2025-21583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21583" }, { "name": "CVE-2025-30705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2025-30684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2025-21579", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579" }, { "name": "CVE-2025-30721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721" }, { "name": "CVE-2025-30722", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30722" }, { "name": "CVE-2025-30687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687" }, { "name": "CVE-2025-30704", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704" }, { "name": "CVE-2024-40896", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40896" }, { "name": "CVE-2025-30693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693" }, { "name": "CVE-2025-21585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585" }, { "name": "CVE-2025-21581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581" }, { "name": "CVE-2025-30685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685" }, { "name": "CVE-2025-30695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695" }, { "name": "CVE-2025-30688", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688" }, { "name": "CVE-2025-21588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588" } ], "initial_release_date": "2025-04-16T00:00:00", "last_revision_date": "2025-04-16T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0320", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL", "vendor_advisories": [ { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuapr2025", "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" } ] }
ghsa-6c2p-rqx3-w4px
Vulnerability from github
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible.
{ "affected": [], "aliases": [ "CVE-2024-40896" ], "database_specific": { "cwe_ids": [ "CWE-611" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-12-23T17:15:08Z", "severity": "CRITICAL" }, "details": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible.", "id": "GHSA-6c2p-rqx3-w4px", "modified": "2025-02-28T15:30:59Z", "published": "2024-12-23T18:30:47Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40896" }, { "type": "WEB", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6" }, { "type": "WEB", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250228-0004" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2024-40896
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting \"checked\"). This makes classic XXE attacks possible." }, { "lang": "es", "value": "En libxml2 2.11 anterior a 2.11.9, 2.12 anterior a 2.12.9 y 2.13 anterior a 2.13.3, el analizador SAX puede producir eventos para entidades externas incluso si los controladores SAX personalizados intentan anular el contenido de la entidad (estableciendo \"marcado\"). Esto hace posibles los ataques XXE cl\u00e1sicos." } ], "id": "CVE-2024-40896", "lastModified": "2025-02-28T13:15:26.640", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-12-23T17:15:08.400", "references": [ { "source": "cve@mitre.org", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6" }, { "source": "cve@mitre.org", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20250228-0004/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Undergoing Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "cve@mitre.org", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.