Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-5535 (GCVE-0-2024-5535)
Vulnerability from cvelistv5
Published
2024-06-27 10:30
Modified
2025-11-03 22:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.
Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.
The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).
This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.
In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.
This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.
The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.
References
Impacted products
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "openssl",
"vendor": "openssl",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "3.3.0",
"versionType": "custom"
},
{
"lessThan": "3.2.3",
"status": "affected",
"version": "3.2.0",
"versionType": "custom"
},
{
"lessThan": "3.1.7",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
},
{
"lessThan": "3.0.15",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThan": "1.1.1za",
"status": "affected",
"version": "1.1.1",
"versionType": "custom"
},
{
"lessThan": "1.0.2zk",
"status": "affected",
"version": "1.0.2",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-5535",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-14T04:55:17.007Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:32:30.900Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "OpenSSL Advisory",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.openssl.org/news/secadv/20240627.txt"
},
{
"name": "3.3.2 git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c"
},
{
"name": "3.2.3 git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e"
},
{
"name": "3.1.7 git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37"
},
{
"name": "3.0.15 git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c"
},
{
"name": "1.1.1za git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87"
},
{
"name": "1.0.2zk git commit",
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/27/1"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/4"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240712-0005/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/08/15/1"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241025-0010/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "OpenSSL",
"vendor": "OpenSSL",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "3.3.0",
"versionType": "semver"
},
{
"lessThan": "3.2.3",
"status": "affected",
"version": "3.2.0",
"versionType": "semver"
},
{
"lessThan": "3.1.7",
"status": "affected",
"version": "3.1.0",
"versionType": "semver"
},
{
"lessThan": "3.0.15",
"status": "affected",
"version": "3.0.0",
"versionType": "semver"
},
{
"lessThan": "1.1.1za",
"status": "affected",
"version": "1.1.1",
"versionType": "custom"
},
{
"lessThan": "1.0.2zk",
"status": "affected",
"version": "1.0.2",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Joseph Birr-Pixton"
},
{
"lang": "en",
"type": "analyst",
"value": "David Benjamin (Google)"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Matt Caswell"
}
],
"datePublic": "2024-06-26T23:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\u003cbr\u003eempty supported client protocols buffer may cause a crash or memory contents to\u003cbr\u003ebe sent to the peer.\u003cbr\u003e\u003cbr\u003eImpact summary: A buffer overread can have a range of potential consequences\u003cbr\u003esuch as unexpected application beahviour or a crash. In particular this issue\u003cbr\u003ecould result in up to 255 bytes of arbitrary private data from memory being sent\u003cbr\u003eto the peer leading to a loss of confidentiality. However, only applications\u003cbr\u003ethat directly call the SSL_select_next_proto function with a 0 length list of\u003cbr\u003esupported client protocols are affected by this issue. This would normally never\u003cbr\u003ebe a valid scenario and is typically not under attacker control but may occur by\u003cbr\u003eaccident in the case of a configuration or programming error in the calling\u003cbr\u003eapplication.\u003cbr\u003e\u003cbr\u003eThe OpenSSL API function SSL_select_next_proto is typically used by TLS\u003cbr\u003eapplications that support ALPN (Application Layer Protocol Negotiation) or NPN\u003cbr\u003e(Next Protocol Negotiation). NPN is older, was never standardised and\u003cbr\u003eis deprecated in favour of ALPN. We believe that ALPN is significantly more\u003cbr\u003ewidely deployed than NPN. The SSL_select_next_proto function accepts a list of\u003cbr\u003eprotocols from the server and a list of protocols from the client and returns\u003cbr\u003ethe first protocol that appears in the server list that also appears in the\u003cbr\u003eclient list. In the case of no overlap between the two lists it returns the\u003cbr\u003efirst item in the client list. In either case it will signal whether an overlap\u003cbr\u003ebetween the two lists was found. In the case where SSL_select_next_proto is\u003cbr\u003ecalled with a zero length client list it fails to notice this condition and\u003cbr\u003ereturns the memory immediately following the client list pointer (and reports\u003cbr\u003ethat there was no overlap in the lists).\u003cbr\u003e\u003cbr\u003eThis function is typically called from a server side application callback for\u003cbr\u003eALPN or a client side application callback for NPN. In the case of ALPN the list\u003cbr\u003eof protocols supplied by the client is guaranteed by libssl to never be zero in\u003cbr\u003elength. The list of server protocols comes from the application and should never\u003cbr\u003enormally be expected to be of zero length. In this case if the\u003cbr\u003eSSL_select_next_proto function has been called as expected (with the list\u003cbr\u003esupplied by the client passed in the client/client_len parameters), then the\u003cbr\u003eapplication will not be vulnerable to this issue. If the application has\u003cbr\u003eaccidentally been configured with a zero length server list, and has\u003cbr\u003eaccidentally passed that zero length server list in the client/client_len\u003cbr\u003eparameters, and has additionally failed to correctly handle a \"no overlap\"\u003cbr\u003eresponse (which would normally result in a handshake failure in ALPN) then it\u003cbr\u003ewill be vulnerable to this problem.\u003cbr\u003e\u003cbr\u003eIn the case of NPN, the protocol permits the client to opportunistically select\u003cbr\u003ea protocol when there is no overlap. OpenSSL returns the first client protocol\u003cbr\u003ein the no overlap case in support of this. The list of client protocols comes\u003cbr\u003efrom the application and should never normally be expected to be of zero length.\u003cbr\u003eHowever if the SSL_select_next_proto function is accidentally called with a\u003cbr\u003eclient_len of 0 then an invalid memory pointer will be returned instead. If the\u003cbr\u003eapplication uses this output as the opportunistic protocol then the loss of\u003cbr\u003econfidentiality will occur.\u003cbr\u003e\u003cbr\u003eThis issue has been assessed as Low severity because applications are most\u003cbr\u003elikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\u003cbr\u003ewidely used. It also requires an application configuration or programming error.\u003cbr\u003eFinally, this issue would not typically be under attacker control making active\u003cbr\u003eexploitation unlikely.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\u003cbr\u003e\u003cbr\u003e\n\nDue to the low severity of this issue we are not issuing new releases of\u003cbr\u003eOpenSSL at this time. The fix will be included in the next releases when they\u003cbr\u003ebecome available."
}
],
"value": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available."
}
],
"metrics": [
{
"format": "other",
"other": {
"content": {
"text": "Low"
},
"type": "https://www.openssl.org/policies/secpolicy.html"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-01T08:29:27.594Z",
"orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"shortName": "openssl"
},
"references": [
{
"name": "OpenSSL Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.openssl.org/news/secadv/20240627.txt"
},
{
"name": "3.3.2 git commit",
"tags": [
"patch"
],
"url": "https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c"
},
{
"name": "3.2.3 git commit",
"tags": [
"patch"
],
"url": "https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e"
},
{
"name": "3.1.7 git commit",
"tags": [
"patch"
],
"url": "https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37"
},
{
"name": "3.0.15 git commit",
"tags": [
"patch"
],
"url": "https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c"
},
{
"name": "1.1.1za git commit",
"tags": [
"patch"
],
"url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87"
},
{
"name": "1.0.2zk git commit",
"tags": [
"patch"
],
"url": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "SSL_select_next_proto buffer overread",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5",
"assignerShortName": "openssl",
"cveId": "CVE-2024-5535",
"datePublished": "2024-06-27T10:30:53.118Z",
"dateReserved": "2024-05-30T15:34:36.813Z",
"dateUpdated": "2025-11-03T22:32:30.900Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-5535\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2024-06-27T11:15:24.447\",\"lastModified\":\"2025-11-03T23:17:30.510\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\\nempty supported client protocols buffer may cause a crash or memory contents to\\nbe sent to the peer.\\n\\nImpact summary: A buffer overread can have a range of potential consequences\\nsuch as unexpected application beahviour or a crash. In particular this issue\\ncould result in up to 255 bytes of arbitrary private data from memory being sent\\nto the peer leading to a loss of confidentiality. However, only applications\\nthat directly call the SSL_select_next_proto function with a 0 length list of\\nsupported client protocols are affected by this issue. This would normally never\\nbe a valid scenario and is typically not under attacker control but may occur by\\naccident in the case of a configuration or programming error in the calling\\napplication.\\n\\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\\n(Next Protocol Negotiation). NPN is older, was never standardised and\\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\\nprotocols from the server and a list of protocols from the client and returns\\nthe first protocol that appears in the server list that also appears in the\\nclient list. In the case of no overlap between the two lists it returns the\\nfirst item in the client list. In either case it will signal whether an overlap\\nbetween the two lists was found. In the case where SSL_select_next_proto is\\ncalled with a zero length client list it fails to notice this condition and\\nreturns the memory immediately following the client list pointer (and reports\\nthat there was no overlap in the lists).\\n\\nThis function is typically called from a server side application callback for\\nALPN or a client side application callback for NPN. In the case of ALPN the list\\nof protocols supplied by the client is guaranteed by libssl to never be zero in\\nlength. The list of server protocols comes from the application and should never\\nnormally be expected to be of zero length. In this case if the\\nSSL_select_next_proto function has been called as expected (with the list\\nsupplied by the client passed in the client/client_len parameters), then the\\napplication will not be vulnerable to this issue. If the application has\\naccidentally been configured with a zero length server list, and has\\naccidentally passed that zero length server list in the client/client_len\\nparameters, and has additionally failed to correctly handle a \\\"no overlap\\\"\\nresponse (which would normally result in a handshake failure in ALPN) then it\\nwill be vulnerable to this problem.\\n\\nIn the case of NPN, the protocol permits the client to opportunistically select\\na protocol when there is no overlap. OpenSSL returns the first client protocol\\nin the no overlap case in support of this. The list of client protocols comes\\nfrom the application and should never normally be expected to be of zero length.\\nHowever if the SSL_select_next_proto function is accidentally called with a\\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\\napplication uses this output as the opportunistic protocol then the loss of\\nconfidentiality will occur.\\n\\nThis issue has been assessed as Low severity because applications are most\\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\\nwidely used. It also requires an application configuration or programming error.\\nFinally, this issue would not typically be under attacker control making active\\nexploitation unlikely.\\n\\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\\n\\nDue to the low severity of this issue we are not issuing new releases of\\nOpenSSL at this time. The fix will be included in the next releases when they\\nbecome available.\"},{\"lang\":\"es\",\"value\":\"Resumen del problema: llamar a la funci\u00f3n API de OpenSSL SSL_select_next_proto con un b\u00fafer de protocolos de cliente compatible vac\u00edo puede provocar una falla o que se env\u00ede contenido de la memoria al igual. Resumen de impacto: una lectura excesiva del b\u00fafer puede tener una variedad de consecuencias potenciales, como un comportamiento inesperado de la aplicaci\u00f3n o un bloqueo. En particular, este problema podr\u00eda provocar que se env\u00eden hasta 255 bytes de datos privados arbitrarios de la memoria al par, lo que provocar\u00eda una p\u00e9rdida de confidencialidad. Sin embargo, este problema solo afecta a las aplicaciones que llaman directamente a la funci\u00f3n SSL_select_next_proto con una lista de longitud 0 de protocolos de cliente compatibles. Normalmente, esto nunca ser\u00eda un escenario v\u00e1lido y normalmente no est\u00e1 bajo el control de un atacante, pero puede ocurrir por accidente en el caso de un error de configuraci\u00f3n o programaci\u00f3n en la aplicaci\u00f3n que realiza la llamada. La funci\u00f3n API de OpenSSL SSL_select_next_proto suele ser utilizada por aplicaciones TLS que admiten ALPN (negociaci\u00f3n de protocolo de capa de aplicaci\u00f3n) o NPN (negociaci\u00f3n de siguiente protocolo). NPN es m\u00e1s antiguo, nunca se estandariz\u00f3 y est\u00e1 en desuso en favor de ALPN. Creemos que ALPN est\u00e1 mucho m\u00e1s implementado que NPN. La funci\u00f3n SSL_select_next_proto acepta una lista de protocolos del servidor y una lista de protocolos del cliente y devuelve el primer protocolo que aparece en la lista de servidores que tambi\u00e9n aparece en la lista de clientes. En caso de que no haya superposici\u00f3n entre las dos listas, devuelve el primer elemento de la lista de clientes. En cualquier caso, indicar\u00e1 si se encontr\u00f3 una superposici\u00f3n entre las dos listas. En el caso de que se llame a SSL_select_next_proto con una lista de clientes de longitud cero, no detecta esta condici\u00f3n y devuelve la memoria inmediatamente despu\u00e9s del puntero de la lista de clientes (e informa que no hubo superposici\u00f3n en las listas). Esta funci\u00f3n normalmente se llama desde una devoluci\u00f3n de llamada de la aplicaci\u00f3n del lado del servidor para ALPN o una devoluci\u00f3n de llamada de la aplicaci\u00f3n del lado del cliente para NPN. En el caso de ALPN, libssl garantiza que la lista de protocolos proporcionados por el cliente nunca tendr\u00e1 una longitud cero. La lista de protocolos del servidor proviene de la aplicaci\u00f3n y normalmente nunca se debe esperar que tenga una longitud cero. En este caso, si la funci\u00f3n SSL_select_next_proto se llam\u00f3 como se esperaba (con la lista proporcionada por el cliente pasada en los par\u00e1metros client/client_len), entonces la aplicaci\u00f3n no ser\u00e1 vulnerable a este problema. Si la aplicaci\u00f3n se configur\u00f3 accidentalmente con una lista de servidores de longitud cero y accidentalmente pas\u00f3 esa lista de servidores de longitud cero en los par\u00e1metros client/client_len y adem\u00e1s no pudo manejar correctamente una respuesta \\\"sin superposici\u00f3n\\\" (que normalmente dar\u00eda como resultado una falla en el protocolo de enlace en ALPN) entonces ser\u00e1 vulnerable a este problema. En el caso de NPN, el protocolo permite al cliente seleccionar de manera oportunista un protocolo cuando no hay superposici\u00f3n. OpenSSL devuelve el primer protocolo de cliente en el caso de que no haya superposici\u00f3n para respaldar esto. La lista de protocolos de cliente proviene de la aplicaci\u00f3n y normalmente nunca se debe esperar que tenga una longitud cero. Sin embargo, si la funci\u00f3n SSL_select_next_proto se llama accidentalmente con un client_len de 0, se devolver\u00e1 un puntero de memoria no v\u00e1lido. Si la aplicaci\u00f3n utiliza esta salida como protocolo oportunista, se producir\u00e1 la p\u00e9rdida de confidencialidad. Este problema se ha evaluado como de gravedad baja porque es m\u00e1s probable que las aplicaciones sean vulnerables si utilizan NPN en lugar de ALPN, pero NPN no se utiliza ampliamente. Tambi\u00e9n requiere una configuraci\u00f3n de la aplicaci\u00f3n o un error de programaci\u00f3n.-- truncada---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"openssl-security@openssl.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"references\":[{\"url\":\"https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://www.openssl.org/news/secadv/20240627.txt\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/27/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/28/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/08/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240712-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20241025-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20241025-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.openssl.org/news/secadv/20240627.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.openssl.org/news/secadv/20240627.txt\", \"name\": \"OpenSSL Advisory\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c\", \"name\": \"3.3.2 git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e\", \"name\": \"3.2.3 git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37\", \"name\": \"3.1.7 git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c\", \"name\": \"3.0.15 git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87\", \"name\": \"1.1.1za git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c\", \"name\": \"1.0.2zk git commit\", \"tags\": [\"patch\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/27/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/28/4\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240712-0005/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/08/15/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-15T12:04:53.153Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-5535\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-27T13:50:16.969601Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\"], \"vendor\": \"openssl\", \"product\": \"openssl\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.3.0\", \"lessThan\": \"3.3.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.2.0\", \"lessThan\": \"3.2.3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.1.0\", \"lessThan\": \"3.1.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.0.15\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.1.1\", \"lessThan\": \"1.1.1za\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0.2\", \"lessThan\": \"1.0.2zk\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-27T13:47:41.434Z\"}}], \"cna\": {\"title\": \"SSL_select_next_proto buffer overread\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Joseph Birr-Pixton\"}, {\"lang\": \"en\", \"type\": \"analyst\", \"value\": \"David Benjamin (Google)\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Matt Caswell\"}], \"metrics\": [{\"other\": {\"type\": \"https://www.openssl.org/policies/secpolicy.html\", \"content\": {\"text\": \"Low\"}}, \"format\": \"other\"}], \"affected\": [{\"vendor\": \"OpenSSL\", \"product\": \"OpenSSL\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.3.0\", \"lessThan\": \"3.3.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.2.0\", \"lessThan\": \"3.2.3\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.1.0\", \"lessThan\": \"3.1.7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.0.15\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.1.1\", \"lessThan\": \"1.1.1za\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0.2\", \"lessThan\": \"1.0.2zk\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-06-26T23:00:00.000Z\", \"references\": [{\"url\": \"https://www.openssl.org/news/secadv/20240627.txt\", \"name\": \"OpenSSL Advisory\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c\", \"name\": \"3.3.2 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e\", \"name\": \"3.2.3 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37\", \"name\": \"3.1.7 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c\", \"name\": \"3.0.15 git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87\", \"name\": \"1.1.1za git commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c\", \"name\": \"1.0.2zk git commit\", \"tags\": [\"patch\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\\nempty supported client protocols buffer may cause a crash or memory contents to\\nbe sent to the peer.\\n\\nImpact summary: A buffer overread can have a range of potential consequences\\nsuch as unexpected application beahviour or a crash. In particular this issue\\ncould result in up to 255 bytes of arbitrary private data from memory being sent\\nto the peer leading to a loss of confidentiality. However, only applications\\nthat directly call the SSL_select_next_proto function with a 0 length list of\\nsupported client protocols are affected by this issue. This would normally never\\nbe a valid scenario and is typically not under attacker control but may occur by\\naccident in the case of a configuration or programming error in the calling\\napplication.\\n\\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\\n(Next Protocol Negotiation). NPN is older, was never standardised and\\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\\nprotocols from the server and a list of protocols from the client and returns\\nthe first protocol that appears in the server list that also appears in the\\nclient list. In the case of no overlap between the two lists it returns the\\nfirst item in the client list. In either case it will signal whether an overlap\\nbetween the two lists was found. In the case where SSL_select_next_proto is\\ncalled with a zero length client list it fails to notice this condition and\\nreturns the memory immediately following the client list pointer (and reports\\nthat there was no overlap in the lists).\\n\\nThis function is typically called from a server side application callback for\\nALPN or a client side application callback for NPN. In the case of ALPN the list\\nof protocols supplied by the client is guaranteed by libssl to never be zero in\\nlength. The list of server protocols comes from the application and should never\\nnormally be expected to be of zero length. In this case if the\\nSSL_select_next_proto function has been called as expected (with the list\\nsupplied by the client passed in the client/client_len parameters), then the\\napplication will not be vulnerable to this issue. If the application has\\naccidentally been configured with a zero length server list, and has\\naccidentally passed that zero length server list in the client/client_len\\nparameters, and has additionally failed to correctly handle a \\\"no overlap\\\"\\nresponse (which would normally result in a handshake failure in ALPN) then it\\nwill be vulnerable to this problem.\\n\\nIn the case of NPN, the protocol permits the client to opportunistically select\\na protocol when there is no overlap. OpenSSL returns the first client protocol\\nin the no overlap case in support of this. The list of client protocols comes\\nfrom the application and should never normally be expected to be of zero length.\\nHowever if the SSL_select_next_proto function is accidentally called with a\\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\\napplication uses this output as the opportunistic protocol then the loss of\\nconfidentiality will occur.\\n\\nThis issue has been assessed as Low severity because applications are most\\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\\nwidely used. It also requires an application configuration or programming error.\\nFinally, this issue would not typically be under attacker control making active\\nexploitation unlikely.\\n\\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\\n\\nDue to the low severity of this issue we are not issuing new releases of\\nOpenSSL at this time. The fix will be included in the next releases when they\\nbecome available.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\u003cbr\u003eempty supported client protocols buffer may cause a crash or memory contents to\u003cbr\u003ebe sent to the peer.\u003cbr\u003e\u003cbr\u003eImpact summary: A buffer overread can have a range of potential consequences\u003cbr\u003esuch as unexpected application beahviour or a crash. In particular this issue\u003cbr\u003ecould result in up to 255 bytes of arbitrary private data from memory being sent\u003cbr\u003eto the peer leading to a loss of confidentiality. However, only applications\u003cbr\u003ethat directly call the SSL_select_next_proto function with a 0 length list of\u003cbr\u003esupported client protocols are affected by this issue. This would normally never\u003cbr\u003ebe a valid scenario and is typically not under attacker control but may occur by\u003cbr\u003eaccident in the case of a configuration or programming error in the calling\u003cbr\u003eapplication.\u003cbr\u003e\u003cbr\u003eThe OpenSSL API function SSL_select_next_proto is typically used by TLS\u003cbr\u003eapplications that support ALPN (Application Layer Protocol Negotiation) or NPN\u003cbr\u003e(Next Protocol Negotiation). NPN is older, was never standardised and\u003cbr\u003eis deprecated in favour of ALPN. We believe that ALPN is significantly more\u003cbr\u003ewidely deployed than NPN. The SSL_select_next_proto function accepts a list of\u003cbr\u003eprotocols from the server and a list of protocols from the client and returns\u003cbr\u003ethe first protocol that appears in the server list that also appears in the\u003cbr\u003eclient list. In the case of no overlap between the two lists it returns the\u003cbr\u003efirst item in the client list. In either case it will signal whether an overlap\u003cbr\u003ebetween the two lists was found. In the case where SSL_select_next_proto is\u003cbr\u003ecalled with a zero length client list it fails to notice this condition and\u003cbr\u003ereturns the memory immediately following the client list pointer (and reports\u003cbr\u003ethat there was no overlap in the lists).\u003cbr\u003e\u003cbr\u003eThis function is typically called from a server side application callback for\u003cbr\u003eALPN or a client side application callback for NPN. In the case of ALPN the list\u003cbr\u003eof protocols supplied by the client is guaranteed by libssl to never be zero in\u003cbr\u003elength. The list of server protocols comes from the application and should never\u003cbr\u003enormally be expected to be of zero length. In this case if the\u003cbr\u003eSSL_select_next_proto function has been called as expected (with the list\u003cbr\u003esupplied by the client passed in the client/client_len parameters), then the\u003cbr\u003eapplication will not be vulnerable to this issue. If the application has\u003cbr\u003eaccidentally been configured with a zero length server list, and has\u003cbr\u003eaccidentally passed that zero length server list in the client/client_len\u003cbr\u003eparameters, and has additionally failed to correctly handle a \\\"no overlap\\\"\u003cbr\u003eresponse (which would normally result in a handshake failure in ALPN) then it\u003cbr\u003ewill be vulnerable to this problem.\u003cbr\u003e\u003cbr\u003eIn the case of NPN, the protocol permits the client to opportunistically select\u003cbr\u003ea protocol when there is no overlap. OpenSSL returns the first client protocol\u003cbr\u003ein the no overlap case in support of this. The list of client protocols comes\u003cbr\u003efrom the application and should never normally be expected to be of zero length.\u003cbr\u003eHowever if the SSL_select_next_proto function is accidentally called with a\u003cbr\u003eclient_len of 0 then an invalid memory pointer will be returned instead. If the\u003cbr\u003eapplication uses this output as the opportunistic protocol then the loss of\u003cbr\u003econfidentiality will occur.\u003cbr\u003e\u003cbr\u003eThis issue has been assessed as Low severity because applications are most\u003cbr\u003elikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\u003cbr\u003ewidely used. It also requires an application configuration or programming error.\u003cbr\u003eFinally, this issue would not typically be under attacker control making active\u003cbr\u003eexploitation unlikely.\u003cbr\u003e\u003cbr\u003eThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\u003cbr\u003e\u003cbr\u003e\\n\\nDue to the low severity of this issue we are not issuing new releases of\u003cbr\u003eOpenSSL at this time. The fix will be included in the next releases when they\u003cbr\u003ebecome available.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"3a12439a-ef3a-4c79-92e6-6081a721f1e5\", \"shortName\": \"openssl\", \"dateUpdated\": \"2025-09-01T08:29:27.594Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-5535\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-01T08:29:27.594Z\", \"dateReserved\": \"2024-05-30T15:34:36.813Z\", \"assignerOrgId\": \"3a12439a-ef3a-4c79-92e6-6081a721f1e5\", \"datePublished\": \"2024-06-27T10:30:53.118Z\", \"assignerShortName\": \"openssl\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
suse-su-2024:2635-1
Vulnerability from csaf_suse
Published
2024-07-30 07:14
Modified
2024-07-30 07:14
Summary
Security update for openssl-3
Notes
Title of the patch
Security update for openssl-3
Description of the patch
This update for openssl-3 fixes the following issues:
Security fixes:
- CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
- Build with enabled sm2 and sm4 support (bsc#1222899)
- Fix non-reproducibility issue (bsc#1223336)
Patchnames
SUSE-2024-2635,SUSE-SLE-Module-Basesystem-15-SP6-2024-2635,openSUSE-SLE-15.6-2024-2635
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3 fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227138)\n\nOther fixes:\n\n- Build with no-afalgeng (bsc#1226463)\n- Build with enabled sm2 and sm4 support (bsc#1222899)\n- Fix non-reproducibility issue (bsc#1223336)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2635,SUSE-SLE-Module-Basesystem-15-SP6-2024-2635,openSUSE-SLE-15.6-2024-2635",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2635-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2635-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242635-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2635-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/036148.html"
},
{
"category": "self",
"summary": "SUSE Bug 1222899",
"url": "https://bugzilla.suse.com/1222899"
},
{
"category": "self",
"summary": "SUSE Bug 1223336",
"url": "https://bugzilla.suse.com/1223336"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-3",
"tracking": {
"current_release_date": "2024-07-30T07:14:10Z",
"generator": {
"date": "2024-07-30T07:14:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2635-1",
"initial_release_date": "2024-07-30T07:14:10Z",
"revision_history": [
{
"date": "2024-07-30T07:14:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"product": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"product_id": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-150600.5.10.1.aarch64",
"product": {
"name": "libopenssl3-3.1.4-150600.5.10.1.aarch64",
"product_id": "libopenssl3-3.1.4-150600.5.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-150600.5.10.1.aarch64",
"product": {
"name": "openssl-3-3.1.4-150600.5.10.1.aarch64",
"product_id": "openssl-3-3.1.4-150600.5.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product": {
"name": "libopenssl-3-devel-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product_id": "libopenssl-3-devel-64bit-3.1.4-150600.5.10.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product": {
"name": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product_id": "libopenssl-3-fips-provider-64bit-3.1.4-150600.5.10.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl3-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product": {
"name": "libopenssl3-64bit-3.1.4-150600.5.10.1.aarch64_ilp32",
"product_id": "libopenssl3-64bit-3.1.4-150600.5.10.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.i586",
"product": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.i586",
"product_id": "libopenssl-3-devel-3.1.4-150600.5.10.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.i586",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.i586",
"product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-150600.5.10.1.i586",
"product": {
"name": "libopenssl3-3.1.4-150600.5.10.1.i586",
"product_id": "libopenssl3-3.1.4-150600.5.10.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-150600.5.10.1.i586",
"product": {
"name": "openssl-3-3.1.4-150600.5.10.1.i586",
"product_id": "openssl-3-3.1.4-150600.5.10.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-3-doc-3.1.4-150600.5.10.1.noarch",
"product": {
"name": "openssl-3-doc-3.1.4-150600.5.10.1.noarch",
"product_id": "openssl-3-doc-3.1.4-150600.5.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"product": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"product_id": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"product": {
"name": "libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"product_id": "libopenssl3-3.1.4-150600.5.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-150600.5.10.1.ppc64le",
"product": {
"name": "openssl-3-3.1.4-150600.5.10.1.ppc64le",
"product_id": "openssl-3-3.1.4-150600.5.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"product": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"product_id": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-150600.5.10.1.s390x",
"product": {
"name": "libopenssl3-3.1.4-150600.5.10.1.s390x",
"product_id": "libopenssl3-3.1.4-150600.5.10.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-150600.5.10.1.s390x",
"product": {
"name": "openssl-3-3.1.4-150600.5.10.1.s390x",
"product_id": "openssl-3-3.1.4-150600.5.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl3-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl3-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"product_id": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-150600.5.10.1.x86_64",
"product": {
"name": "openssl-3-3.1.4-150600.5.10.1.x86_64",
"product_id": "openssl-3-3.1.4-150600.5.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl3-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.aarch64"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.ppc64le"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.s390x"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-150600.5.10.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.x86_64"
},
"product_reference": "openssl-3-3.1.4-150600.5.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-doc-3.1.4-150600.5.10.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.10.1.noarch"
},
"product_reference": "openssl-3-doc-3.1.4-150600.5.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.10.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.10.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-devel-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-devel-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:libopenssl3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:libopenssl3-32bit-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.aarch64",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.ppc64le",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.s390x",
"openSUSE Leap 15.6:openssl-3-3.1.4-150600.5.10.1.x86_64",
"openSUSE Leap 15.6:openssl-3-doc-3.1.4-150600.5.10.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-30T07:14:10Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2927-1
Vulnerability from csaf_suse
Published
2024-08-15 07:03
Modified
2024-08-15 07:03
Summary
Security update for openssl-1_1
Notes
Title of the patch
Security update for openssl-1_1
Description of the patch
This update for openssl-1_1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
Patchnames
SUSE-2024-2927,SUSE-SLE-Micro-5.3-2024-2927,SUSE-SLE-Micro-5.4-2024-2927,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2927,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2927,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2927,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2927
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n - CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\nOther fixes:\n- Build with no-afalgeng (bsc#1226463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2927,SUSE-SLE-Micro-5.3-2024-2927,SUSE-SLE-Micro-5.4-2024-2927,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2927,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2927,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2927,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2927,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2927",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2927-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2927-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242927-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2927-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2024-08-15T07:03:17Z",
"generator": {
"date": "2024-08-15T07:03:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2927-1",
"initial_release_date": "2024-08-15T07:03:17Z",
"revision_history": [
{
"date": "2024-08-15T07:03:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"product_id": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"product_id": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1l-150400.7.72.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.i586",
"product_id": "libopenssl1_1-1.1.1l-150400.7.72.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.i586",
"product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150400.7.72.1.i586",
"product": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.i586",
"product_id": "openssl-1_1-1.1.1l-150400.7.72.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-150400.7.72.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1l-150400.7.72.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1l-150400.7.72.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"product_id": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"product_id": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"product_id": "openssl-1_1-1.1.1l-150400.7.72.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"product_id": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Micro 5.4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-1_1-devel-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:libopenssl1_1-hmac-32bit-1.1.1l-150400.7.72.1.x86_64",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.ppc64le",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.s390x",
"SUSE Manager Server 4.3:openssl-1_1-1.1.1l-150400.7.72.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T07:03:17Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:3019-1
Vulnerability from csaf_suse
Published
2024-08-27 08:50
Modified
2024-08-27 08:50
Summary
Security update for openssl-3
Notes
Title of the patch
Security update for openssl-3
Description of the patch
This update for openssl-3 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
Patchnames
SUSE-2024-3019,SUSE-SLE-Module-Basesystem-15-SP5-2024-3019,openSUSE-SLE-15.5-2024-3019
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\nOther fixes:\n- Build with no-afalgeng (bsc#1226463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3019,SUSE-SLE-Module-Basesystem-15-SP5-2024-3019,openSUSE-SLE-15.5-2024-3019",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3019-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3019-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243019-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3019-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-August/036687.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-3",
"tracking": {
"current_release_date": "2024-08-27T08:50:29Z",
"generator": {
"date": "2024-08-27T08:50:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3019-1",
"initial_release_date": "2024-08-27T08:50:29Z",
"revision_history": [
{
"date": "2024-08-27T08:50:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"product": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"product_id": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150500.5.39.1.aarch64",
"product": {
"name": "libopenssl3-3.0.8-150500.5.39.1.aarch64",
"product_id": "libopenssl3-3.0.8-150500.5.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150500.5.39.1.aarch64",
"product": {
"name": "openssl-3-3.0.8-150500.5.39.1.aarch64",
"product_id": "openssl-3-3.0.8-150500.5.39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-64bit-3.0.8-150500.5.39.1.aarch64_ilp32",
"product": {
"name": "libopenssl-3-devel-64bit-3.0.8-150500.5.39.1.aarch64_ilp32",
"product_id": "libopenssl-3-devel-64bit-3.0.8-150500.5.39.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl3-64bit-3.0.8-150500.5.39.1.aarch64_ilp32",
"product": {
"name": "libopenssl3-64bit-3.0.8-150500.5.39.1.aarch64_ilp32",
"product_id": "libopenssl3-64bit-3.0.8-150500.5.39.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.i586",
"product": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.i586",
"product_id": "libopenssl-3-devel-3.0.8-150500.5.39.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150500.5.39.1.i586",
"product": {
"name": "libopenssl3-3.0.8-150500.5.39.1.i586",
"product_id": "libopenssl3-3.0.8-150500.5.39.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150500.5.39.1.i586",
"product": {
"name": "openssl-3-3.0.8-150500.5.39.1.i586",
"product_id": "openssl-3-3.0.8-150500.5.39.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-3-doc-3.0.8-150500.5.39.1.noarch",
"product": {
"name": "openssl-3-doc-3.0.8-150500.5.39.1.noarch",
"product_id": "openssl-3-doc-3.0.8-150500.5.39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"product": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"product_id": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"product": {
"name": "libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"product_id": "libopenssl3-3.0.8-150500.5.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150500.5.39.1.ppc64le",
"product": {
"name": "openssl-3-3.0.8-150500.5.39.1.ppc64le",
"product_id": "openssl-3-3.0.8-150500.5.39.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"product": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"product_id": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150500.5.39.1.s390x",
"product": {
"name": "libopenssl3-3.0.8-150500.5.39.1.s390x",
"product_id": "libopenssl3-3.0.8-150500.5.39.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150500.5.39.1.s390x",
"product": {
"name": "openssl-3-3.0.8-150500.5.39.1.s390x",
"product_id": "openssl-3-3.0.8-150500.5.39.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"product": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"product_id": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"product": {
"name": "libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"product_id": "libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150500.5.39.1.x86_64",
"product": {
"name": "libopenssl3-3.0.8-150500.5.39.1.x86_64",
"product_id": "libopenssl3-3.0.8-150500.5.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"product": {
"name": "libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"product_id": "libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150500.5.39.1.x86_64",
"product": {
"name": "openssl-3-3.0.8-150500.5.39.1.x86_64",
"product_id": "openssl-3-3.0.8-150500.5.39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150500.5.39.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.aarch64"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.ppc64le"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.s390x"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150500.5.39.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150500.5.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-doc-3.0.8-150500.5.39.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.39.1.noarch"
},
"product_reference": "openssl-3-doc-3.0.8-150500.5.39.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.39.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.39.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl-3-devel-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl-3-devel-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:libopenssl3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:libopenssl3-32bit-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.aarch64",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.ppc64le",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.s390x",
"openSUSE Leap 15.5:openssl-3-3.0.8-150500.5.39.1.x86_64",
"openSUSE Leap 15.5:openssl-3-doc-3.0.8-150500.5.39.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-27T08:50:29Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2025:20014-1
Vulnerability from csaf_suse
Published
2025-02-03 08:48
Modified
2025-02-03 08:48
Summary
Security update for openssl-3, libpulp, ulp-macros
Notes
Title of the patch
Security update for openssl-3, libpulp, ulp-macros
Description of the patch
This update for openssl-3, libpulp, ulp-macros fixes the following issues:
openssl-3:
- CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465)
- CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138)
- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551)
- CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388)
- CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548)
- FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365)
- FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753)
- FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523)
- FIPS: Port openssl to use jitterentropy (bsc#1220523)
- FIPS: Block non-Approved Elliptic Curves (bsc#1221786)
- FIPS: Service Level Indicator (bsc#1221365)
- FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751)
- FIPS: Add required selftests (bsc#1221760)
- FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821)
- FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827)
- FIPS: Zeroization is required (bsc#1221752)
- FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696)
- FIPS: NIST SP 800-56Brev2 (bsc#1221824)
- FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787)
- FIPS: Port openssl to use jitterentropy (bsc#1220523)
- FIPS: NIST SP 800-56Arev3 (bsc#1221822)
- FIPS: Error state has to be enforced (bsc#1221753)
- Build with enabled sm2 and sm4 support (bsc#1222899)
- fix non-reproducible build issue
- Fix HDKF key derivation (bsc#1225291)
- Enable livepatching support (bsc#1223428)
libpulp:
- Update package with libpulp-0.3.5
* Change .so load policy from lazy to eager.
* Fix patch of references when mprotect is enabled.
* Fix tramposed calloc arguments.
* Fix crash of ulp packer on empty lines.
- Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763).
- Update package with libpulp-0.3.4:
* Add debuginfo into ulp extract.
- Disabled ptrace_scope when building the package (bsc#1221763).
- Update package with libpulp-0.3.3:
* Fixed a race condition when process list is empty.
* Removed "Unable to get section data" error message (bsc#1223306).
* Bumped asunsafe_conversion attempts from 100 to 2000.
* Fixed banner test on clang-18.
* Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763).
- Update package with libpulp-0.3.1:
* Add timestamp information on `ulp patches`.
ulp-macros:
- Initial release.
Patchnames
SUSE-SLE-Micro-6.0-58
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3, libpulp, ulp-macros",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3, libpulp, ulp-macros fixes the following issues:\n\nopenssl-3:\n - CVE-2024-6119: possible denial of service in X.509 name checks (bsc#1229465)\n - CVE-2024-5535: SSL_select_next_proto buffer overread (bsc#1227138)\n - CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers (bsc#1225551)\n - CVE-2024-4603: Check DSA parameters for excessive sizes before validating (bsc#1224388)\n - CVE-2024-2511: Fix unconstrained session cache growth in TLSv1.3 (bsc#1222548)\n - FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365)\n - FIPS: RSA keygen PCT requirements. (bsc#1221760, bsc#1221753)\n - FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. (bsc#1220523)\n - FIPS: Port openssl to use jitterentropy (bsc#1220523)\n - FIPS: Block non-Approved Elliptic Curves (bsc#1221786)\n - FIPS: Service Level Indicator (bsc#1221365)\n - FIPS: Output the FIPS-validation name and module version which uniquely identify the FIPS validated module. (bsc#1221751)\n - FIPS: Add required selftests (bsc#1221760)\n - FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821)\n - FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827)\n - FIPS: Zeroization is required (bsc#1221752)\n - FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696)\n - FIPS: NIST SP 800-56Brev2 (bsc#1221824)\n - FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787)\n - FIPS: Port openssl to use jitterentropy (bsc#1220523)\n - FIPS: NIST SP 800-56Arev3 (bsc#1221822)\n - FIPS: Error state has to be enforced (bsc#1221753)\n - Build with enabled sm2 and sm4 support (bsc#1222899)\n - fix non-reproducible build issue\n - Fix HDKF key derivation (bsc#1225291)\n - Enable livepatching support (bsc#1223428)\n\nlibpulp:\n - Update package with libpulp-0.3.5\n * Change .so load policy from lazy to eager.\n * Fix patch of references when mprotect is enabled.\n * Fix tramposed calloc arguments.\n * Fix crash of ulp packer on empty lines.\n\n - Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763).\n - Update package with libpulp-0.3.4:\n * Add debuginfo into ulp extract.\n\n - Disabled ptrace_scope when building the package (bsc#1221763).\n - Update package with libpulp-0.3.3:\n * Fixed a race condition when process list is empty.\n * Removed \"Unable to get section data\" error message (bsc#1223306).\n * Bumped asunsafe_conversion attempts from 100 to 2000.\n * Fixed banner test on clang-18.\n * Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763).\n\n - Update package with libpulp-0.3.1:\n * Add timestamp information on `ulp patches`.\n\nulp-macros:\n - Initial release.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-58",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20014-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20014-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520014-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20014-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html"
},
{
"category": "self",
"summary": "SUSE Bug 1220523",
"url": "https://bugzilla.suse.com/1220523"
},
{
"category": "self",
"summary": "SUSE Bug 1220690",
"url": "https://bugzilla.suse.com/1220690"
},
{
"category": "self",
"summary": "SUSE Bug 1220693",
"url": "https://bugzilla.suse.com/1220693"
},
{
"category": "self",
"summary": "SUSE Bug 1220696",
"url": "https://bugzilla.suse.com/1220696"
},
{
"category": "self",
"summary": "SUSE Bug 1221365",
"url": "https://bugzilla.suse.com/1221365"
},
{
"category": "self",
"summary": "SUSE Bug 1221751",
"url": "https://bugzilla.suse.com/1221751"
},
{
"category": "self",
"summary": "SUSE Bug 1221752",
"url": "https://bugzilla.suse.com/1221752"
},
{
"category": "self",
"summary": "SUSE Bug 1221753",
"url": "https://bugzilla.suse.com/1221753"
},
{
"category": "self",
"summary": "SUSE Bug 1221760",
"url": "https://bugzilla.suse.com/1221760"
},
{
"category": "self",
"summary": "SUSE Bug 1221763",
"url": "https://bugzilla.suse.com/1221763"
},
{
"category": "self",
"summary": "SUSE Bug 1221786",
"url": "https://bugzilla.suse.com/1221786"
},
{
"category": "self",
"summary": "SUSE Bug 1221787",
"url": "https://bugzilla.suse.com/1221787"
},
{
"category": "self",
"summary": "SUSE Bug 1221821",
"url": "https://bugzilla.suse.com/1221821"
},
{
"category": "self",
"summary": "SUSE Bug 1221822",
"url": "https://bugzilla.suse.com/1221822"
},
{
"category": "self",
"summary": "SUSE Bug 1221824",
"url": "https://bugzilla.suse.com/1221824"
},
{
"category": "self",
"summary": "SUSE Bug 1221827",
"url": "https://bugzilla.suse.com/1221827"
},
{
"category": "self",
"summary": "SUSE Bug 1222548",
"url": "https://bugzilla.suse.com/1222548"
},
{
"category": "self",
"summary": "SUSE Bug 1222899",
"url": "https://bugzilla.suse.com/1222899"
},
{
"category": "self",
"summary": "SUSE Bug 1223306",
"url": "https://bugzilla.suse.com/1223306"
},
{
"category": "self",
"summary": "SUSE Bug 1223336",
"url": "https://bugzilla.suse.com/1223336"
},
{
"category": "self",
"summary": "SUSE Bug 1223428",
"url": "https://bugzilla.suse.com/1223428"
},
{
"category": "self",
"summary": "SUSE Bug 1224388",
"url": "https://bugzilla.suse.com/1224388"
},
{
"category": "self",
"summary": "SUSE Bug 1225291",
"url": "https://bugzilla.suse.com/1225291"
},
{
"category": "self",
"summary": "SUSE Bug 1225551",
"url": "https://bugzilla.suse.com/1225551"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE Bug 1229465",
"url": "https://bugzilla.suse.com/1229465"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2511 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4741 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6119 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6119/"
}
],
"title": "Security update for openssl-3, libpulp, ulp-macros",
"tracking": {
"current_release_date": "2025-02-03T08:48:16Z",
"generator": {
"date": "2025-02-03T08:48:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20014-1",
"initial_release_date": "2025-02-03T08:48:16Z",
"revision_history": [
{
"date": "2025-02-03T08:48:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "jitterentropy-devel-3.4.1-3.1.aarch64",
"product": {
"name": "jitterentropy-devel-3.4.1-3.1.aarch64",
"product_id": "jitterentropy-devel-3.4.1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjitterentropy3-3.4.1-3.1.aarch64",
"product": {
"name": "libjitterentropy3-3.4.1-3.1.aarch64",
"product_id": "libjitterentropy3-3.4.1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-6.1.aarch64",
"product": {
"name": "libopenssl-3-devel-3.1.4-6.1.aarch64",
"product_id": "libopenssl-3-devel-3.1.4-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"product_id": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-6.1.aarch64",
"product": {
"name": "libopenssl3-3.1.4-6.1.aarch64",
"product_id": "libopenssl3-3.1.4-6.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-6.1.aarch64",
"product": {
"name": "openssl-3-3.1.4-6.1.aarch64",
"product_id": "openssl-3-3.1.4-6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jitterentropy-devel-3.4.1-3.1.s390x",
"product": {
"name": "jitterentropy-devel-3.4.1-3.1.s390x",
"product_id": "jitterentropy-devel-3.4.1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libjitterentropy3-3.4.1-3.1.s390x",
"product": {
"name": "libjitterentropy3-3.4.1-3.1.s390x",
"product_id": "libjitterentropy3-3.4.1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-6.1.s390x",
"product": {
"name": "libopenssl-3-devel-3.1.4-6.1.s390x",
"product_id": "libopenssl-3-devel-3.1.4-6.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"product_id": "libopenssl-3-fips-provider-3.1.4-6.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-6.1.s390x",
"product": {
"name": "libopenssl3-3.1.4-6.1.s390x",
"product_id": "libopenssl3-3.1.4-6.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-6.1.s390x",
"product": {
"name": "openssl-3-3.1.4-6.1.s390x",
"product_id": "openssl-3-3.1.4-6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jitterentropy-devel-3.4.1-3.1.x86_64",
"product": {
"name": "jitterentropy-devel-3.4.1-3.1.x86_64",
"product_id": "jitterentropy-devel-3.4.1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjitterentropy3-3.4.1-3.1.x86_64",
"product": {
"name": "libjitterentropy3-3.4.1-3.1.x86_64",
"product_id": "libjitterentropy3-3.4.1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-6.1.x86_64",
"product": {
"name": "libopenssl-3-devel-3.1.4-6.1.x86_64",
"product_id": "libopenssl-3-devel-3.1.4-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"product_id": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-6.1.x86_64",
"product": {
"name": "libopenssl3-3.1.4-6.1.x86_64",
"product_id": "libopenssl3-3.1.4-6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpulp-tools-0.3.5-1.1.x86_64",
"product": {
"name": "libpulp-tools-0.3.5-1.1.x86_64",
"product_id": "libpulp-tools-0.3.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpulp0-0.3.5-1.1.x86_64",
"product": {
"name": "libpulp0-0.3.5-1.1.x86_64",
"product_id": "libpulp0-0.3.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-6.1.x86_64",
"product": {
"name": "openssl-3-3.1.4-6.1.x86_64",
"product_id": "openssl-3-3.1.4-6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jitterentropy-devel-3.4.1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64"
},
"product_reference": "jitterentropy-devel-3.4.1-3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jitterentropy-devel-3.4.1-3.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x"
},
"product_reference": "jitterentropy-devel-3.4.1-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jitterentropy-devel-3.4.1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64"
},
"product_reference": "jitterentropy-devel-3.4.1-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjitterentropy3-3.4.1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64"
},
"product_reference": "libjitterentropy3-3.4.1-3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjitterentropy3-3.4.1-3.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x"
},
"product_reference": "libjitterentropy3-3.4.1-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjitterentropy3-3.4.1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64"
},
"product_reference": "libjitterentropy3-3.4.1-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.1.4-6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.1.4-6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.1.4-6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64"
},
"product_reference": "libopenssl3-3.1.4-6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x"
},
"product_reference": "libopenssl3-3.1.4-6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64"
},
"product_reference": "libopenssl3-3.1.4-6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpulp-tools-0.3.5-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64"
},
"product_reference": "libpulp-tools-0.3.5-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpulp0-0.3.5-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64"
},
"product_reference": "libpulp0-0.3.5-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-6.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64"
},
"product_reference": "openssl-3-3.1.4-6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-6.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x"
},
"product_reference": "openssl-3-3.1.4-6.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-6.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
},
"product_reference": "openssl-3-3.1.4-6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2511"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2511",
"url": "https://www.suse.com/security/cve/CVE-2024-2511"
},
{
"category": "external",
"summary": "SUSE Bug 1222548 for CVE-2024-2511",
"url": "https://bugzilla.suse.com/1222548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:48:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4603"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Checking excessively long DSA keys or parameters may be very\nslow.\n\nImpact summary: Applications that use the functions EVP_PKEY_param_check()\nor EVP_PKEY_public_check() to check a DSA public key or DSA parameters may\nexperience long delays. Where the key or parameters that are being checked\nhave been obtained from an untrusted source this may lead to a Denial of\nService.\n\nThe functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform\nvarious checks on DSA parameters. Some of those computations take a long time\nif the modulus (`p` parameter) is too large.\n\nTrying to use a very large modulus is slow and OpenSSL will not allow using\npublic keys with a modulus which is over 10,000 bits in length for signature\nverification. However the key and parameter check functions do not limit\nthe modulus size when performing the checks.\n\nAn application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()\nand supplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nThese functions are not called by OpenSSL itself on untrusted DSA keys so\nonly applications that directly call these functions may be vulnerable.\n\nAlso vulnerable are the OpenSSL pkey and pkeyparam command line applications\nwhen using the `-check` option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4603",
"url": "https://www.suse.com/security/cve/CVE-2024-4603"
},
{
"category": "external",
"summary": "SUSE Bug 1224388 for CVE-2024-4603",
"url": "https://bugzilla.suse.com/1224388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:48:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4741"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause\nmemory to be accessed that was previously freed in some situations\n\nImpact summary: A use after free can have a range of potential consequences such\nas the corruption of valid data, crashes or execution of arbitrary code.\nHowever, only applications that directly call the SSL_free_buffers function are\naffected by this issue. Applications that do not call this function are not\nvulnerable. Our investigations indicate that this function is rarely used by\napplications.\n\nThe SSL_free_buffers function is used to free the internal OpenSSL buffer used\nwhen processing an incoming record from the network. The call is only expected\nto succeed if the buffer is not currently in use. However, two scenarios have\nbeen identified where the buffer is freed even when still in use.\n\nThe first scenario occurs where a record header has been received from the\nnetwork and processed by OpenSSL, but the full record body has not yet arrived.\nIn this case calling SSL_free_buffers will succeed even though a record has only\nbeen partially processed and the buffer is still in use.\n\nThe second scenario occurs where a full record containing application data has\nbeen received and processed by OpenSSL but the application has only read part of\nthis data. Again a call to SSL_free_buffers will succeed even though the buffer\nis still in use.\n\nWhile these scenarios could occur accidentally during normal operation a\nmalicious attacker could attempt to engineer a stituation where this occurs.\nWe are not aware of this issue being actively exploited.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4741",
"url": "https://www.suse.com/security/cve/CVE-2024-4741"
},
{
"category": "external",
"summary": "SUSE Bug 1225551 for CVE-2024-4741",
"url": "https://bugzilla.suse.com/1225551"
},
{
"category": "external",
"summary": "SUSE Bug 1225552 for CVE-2024-4741",
"url": "https://bugzilla.suse.com/1225552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:48:16Z",
"details": "important"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:48:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6119"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Applications performing certificate name checks (e.g., TLS\nclients checking server certificates) may attempt to read an invalid memory\naddress resulting in abnormal termination of the application process.\n\nImpact summary: Abnormal termination of an application can a cause a denial of\nservice.\n\nApplications performing certificate name checks (e.g., TLS clients checking\nserver certificates) may attempt to read an invalid memory address when\ncomparing the expected name with an `otherName` subject alternative name of an\nX.509 certificate. This may result in an exception that terminates the\napplication program.\n\nNote that basic certificate chain validation (signatures, dates, ...) is not\naffected, the denial of service can occur only when the application also\nspecifies an expected DNS name, Email address or IP address.\n\nTLS servers rarely solicit client certificates, and even when they do, they\ngenerally don\u0027t perform a name check against a reference identifier (expected\nidentity), but rather extract the presented identity after checking the\ncertificate chain. So TLS servers are generally not affected and the severity\nof the issue is Moderate.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6119",
"url": "https://www.suse.com/security/cve/CVE-2024-6119"
},
{
"category": "external",
"summary": "SUSE Bug 1229465 for CVE-2024-6119",
"url": "https://bugzilla.suse.com/1229465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:jitterentropy-devel-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.aarch64",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.s390x",
"SUSE Linux Micro 6.0:libjitterentropy3-3.4.1-3.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-6.1.x86_64",
"SUSE Linux Micro 6.0:libpulp-tools-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:libpulp0-0.3.5-1.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-02-03T08:48:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-6119"
}
]
}
suse-su-2024:2931-1
Vulnerability from csaf_suse
Published
2024-08-15 09:42
Modified
2024-08-15 09:42
Summary
Security update for openssl-3
Notes
Title of the patch
Security update for openssl-3
Description of the patch
This update for openssl-3 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
Patchnames
SUSE-2024-2931,SUSE-SLE-Micro-5.3-2024-2931,SUSE-SLE-Micro-5.4-2024-2931,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2931,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2931,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2931,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2931
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\nOther fixes:\n- Build with no-afalgeng (bsc#1226463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2931,SUSE-SLE-Micro-5.3-2024-2931,SUSE-SLE-Micro-5.4-2024-2931,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2931,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2931,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2931,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2931,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2931",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2931-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2931-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242931-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2931-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-3",
"tracking": {
"current_release_date": "2024-08-15T09:42:19Z",
"generator": {
"date": "2024-08-15T09:42:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2931-1",
"initial_release_date": "2024-08-15T09:42:19Z",
"revision_history": [
{
"date": "2024-08-15T09:42:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"product": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"product_id": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"product": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"product_id": "libopenssl3-3.0.8-150400.4.60.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150400.4.60.1.aarch64",
"product": {
"name": "openssl-3-3.0.8-150400.4.60.1.aarch64",
"product_id": "openssl-3-3.0.8-150400.4.60.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-64bit-3.0.8-150400.4.60.1.aarch64_ilp32",
"product": {
"name": "libopenssl-3-devel-64bit-3.0.8-150400.4.60.1.aarch64_ilp32",
"product_id": "libopenssl-3-devel-64bit-3.0.8-150400.4.60.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl3-64bit-3.0.8-150400.4.60.1.aarch64_ilp32",
"product": {
"name": "libopenssl3-64bit-3.0.8-150400.4.60.1.aarch64_ilp32",
"product_id": "libopenssl3-64bit-3.0.8-150400.4.60.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.i586",
"product": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.i586",
"product_id": "libopenssl-3-devel-3.0.8-150400.4.60.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150400.4.60.1.i586",
"product": {
"name": "libopenssl3-3.0.8-150400.4.60.1.i586",
"product_id": "libopenssl3-3.0.8-150400.4.60.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150400.4.60.1.i586",
"product": {
"name": "openssl-3-3.0.8-150400.4.60.1.i586",
"product_id": "openssl-3-3.0.8-150400.4.60.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-3-doc-3.0.8-150400.4.60.1.noarch",
"product": {
"name": "openssl-3-doc-3.0.8-150400.4.60.1.noarch",
"product_id": "openssl-3-doc-3.0.8-150400.4.60.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"product": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"product_id": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"product": {
"name": "libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"product_id": "libopenssl3-3.0.8-150400.4.60.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150400.4.60.1.ppc64le",
"product": {
"name": "openssl-3-3.0.8-150400.4.60.1.ppc64le",
"product_id": "openssl-3-3.0.8-150400.4.60.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"product": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"product_id": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"product": {
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"product_id": "libopenssl3-3.0.8-150400.4.60.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150400.4.60.1.s390x",
"product": {
"name": "openssl-3-3.0.8-150400.4.60.1.s390x",
"product_id": "openssl-3-3.0.8-150400.4.60.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"product": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"product_id": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-devel-32bit-3.0.8-150400.4.60.1.x86_64",
"product": {
"name": "libopenssl-3-devel-32bit-3.0.8-150400.4.60.1.x86_64",
"product_id": "libopenssl-3-devel-32bit-3.0.8-150400.4.60.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"product": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"product_id": "libopenssl3-3.0.8-150400.4.60.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-32bit-3.0.8-150400.4.60.1.x86_64",
"product": {
"name": "libopenssl3-32bit-3.0.8-150400.4.60.1.x86_64",
"product_id": "libopenssl3-32bit-3.0.8-150400.4.60.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"product": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"product_id": "openssl-3-3.0.8-150400.4.60.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "libopenssl3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.ppc64le"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.s390x"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.0.8-150400.4.60.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64"
},
"product_reference": "openssl-3-3.0.8-150400.4.60.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Proxy 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl-3-devel-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:libopenssl3-3.0.8-150400.4.60.1.x86_64",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.ppc64le",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.s390x",
"SUSE Manager Server 4.3:openssl-3-3.0.8-150400.4.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T09:42:19Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2989-1
Vulnerability from csaf_suse
Published
2024-08-20 14:17
Modified
2024-08-20 14:17
Summary
Security update for openssl-1_0_0
Notes
Title of the patch
Security update for openssl-1_0_0
Description of the patch
This update for openssl-1_0_0 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)
Patchnames
SUSE-2024-2989,SUSE-SLE-SDK-12-SP5-2024-2989,SUSE-SLE-SERVER-12-SP5-2024-2989
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_0_0",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_0_0 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2989,SUSE-SLE-SDK-12-SP5-2024-2989,SUSE-SLE-SERVER-12-SP5-2024-2989",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2989-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2989-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242989-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2989-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE Bug 1227227",
"url": "https://bugzilla.suse.com/1227227"
},
{
"category": "self",
"summary": "SUSE Bug 1228291",
"url": "https://bugzilla.suse.com/1228291"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_0_0",
"tracking": {
"current_release_date": "2024-08-20T14:17:16Z",
"generator": {
"date": "2024-08-20T14:17:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2989-1",
"initial_release_date": "2024-08-20T14:17:16Z",
"revision_history": [
{
"date": "2024-08-20T14:17:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_0_0-devel-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product_id": "libopenssl-1_0_0-devel-64bit-1.0.2p-3.95.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-64bit-1.0.2p-3.95.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-hmac-64bit-1.0.2p-3.95.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-hmac-64bit-1.0.2p-3.95.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.i586",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.i586",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.i586",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.i586",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.i586",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.i586",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.i586",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.i586",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"product": {
"name": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"product_id": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390x",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390x",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"product": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"product_id": "openssl-1_0_0-1.0.2p-3.95.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch"
},
"product_reference": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-3.95.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch"
},
"product_reference": "openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_0_0-hmac-32bit-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_0_0-doc-1.0.2p-3.95.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-1.0.2p-3.95.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_0_0-devel-32bit-1.0.2p-3.95.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-20T14:17:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2991-1
Vulnerability from csaf_suse
Published
2024-08-20 14:17
Modified
2024-08-20 14:17
Summary
Security update for openssl1
Notes
Title of the patch
Security update for openssl1
Description of the patch
This update for openssl1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Patchnames
SUSE-2024-2991,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-2991
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl1 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2991,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-2991",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2991-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2991-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242991-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2991-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl1",
"tracking": {
"current_release_date": "2024-08-20T14:17:31Z",
"generator": {
"date": "2024-08-20T14:17:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2991-1",
"initial_release_date": "2024-08-20T14:17:31Z",
"revision_history": [
{
"date": "2024-08-20T14:17:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.i586",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.i586",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.i586",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.i586",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.i586"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.i586",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.i586",
"product_id": "openssl1-1.0.1g-0.58.82.1.i586"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.i586",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.i586",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ia64",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ia64",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.ia64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ia64",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ia64",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.ia64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-x86-1.0.1g-0.58.82.1.ia64",
"product": {
"name": "libopenssl1_0_0-x86-1.0.1g-0.58.82.1.ia64",
"product_id": "libopenssl1_0_0-x86-1.0.1g-0.58.82.1.ia64"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.ia64",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.ia64",
"product_id": "openssl1-1.0.1g-0.58.82.1.ia64"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.ia64",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.ia64",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc"
}
},
{
"category": "product_version",
"name": "libopenssl1-devel-64bit-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "libopenssl1-devel-64bit-1.0.1g-0.58.82.1.ppc",
"product_id": "libopenssl1-devel-64bit-1.0.1g-0.58.82.1.ppc"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-64bit-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "libopenssl1_0_0-64bit-1.0.1g-0.58.82.1.ppc",
"product_id": "libopenssl1_0_0-64bit-1.0.1g-0.58.82.1.ppc"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.ppc",
"product_id": "openssl1-1.0.1g-0.58.82.1.ppc"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.ppc",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.ppc",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.ppc"
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc64",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.ppc64",
"product_id": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc64",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.ppc64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.ppc64",
"product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.ppc64"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.ppc64",
"product_id": "openssl1-1.0.1g-0.58.82.1.ppc64"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.ppc64",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.ppc64",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.s390",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.s390",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.s390",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.s390",
"product_id": "openssl1-1.0.1g-0.58.82.1.s390"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.s390",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.s390",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.s390x",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.s390x",
"product_id": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390x",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.s390x",
"product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.s390x",
"product_id": "openssl1-1.0.1g-0.58.82.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.s390x",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.s390x",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"product_id": "libopenssl1-devel-1.0.1g-0.58.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.x86_64",
"product_id": "libopenssl1-devel-32bit-1.0.1g-0.58.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"product_id": "libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl1-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "openssl1-1.0.1g-0.58.82.1.x86_64",
"product_id": "openssl1-1.0.1g-0.58.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl1-doc-1.0.1g-0.58.82.1.x86_64",
"product": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.x86_64",
"product_id": "openssl1-doc-1.0.1g-0.58.82.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1-devel-1.0.1g-0.58.82.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1-devel-1.0.1g-0.58.82.1.x86_64"
},
"product_reference": "libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl1-1.0.1g-0.58.82.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-1.0.1g-0.58.82.1.x86_64"
},
"product_reference": "openssl1-1.0.1g-0.58.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl1-doc-1.0.1g-0.58.82.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-doc-1.0.1g-0.58.82.1.x86_64"
},
"product_reference": "openssl1-doc-1.0.1g-0.58.82.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-doc-1.0.1g-0.58.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-doc-1.0.1g-0.58.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1-devel-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:libopenssl1_0_0-32bit-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-1.0.1g-0.58.82.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:openssl1-doc-1.0.1g-0.58.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-20T14:17:31Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2909-1
Vulnerability from csaf_suse
Published
2024-08-14 12:48
Modified
2024-08-14 12:48
Summary
Security update for openssl-1_1
Notes
Title of the patch
Security update for openssl-1_1
Description of the patch
This update for openssl-1_1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Patchnames
SUSE-2024-2909,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2909,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2909,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2909,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2909,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2909,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2909,SUSE-SUSE-MicroOS-5.1-2024-2909,SUSE-SUSE-MicroOS-5.2-2024-2909,SUSE-Storage-7.1-2024-2909
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2909,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2909,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2909,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2909,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2909,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2909,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2909,SUSE-SUSE-MicroOS-5.1-2024-2909,SUSE-SUSE-MicroOS-5.2-2024-2909,SUSE-Storage-7.1-2024-2909",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2909-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2909-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242909-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2909-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2024-08-14T12:48:03Z",
"generator": {
"date": "2024-08-14T12:48:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2909-1",
"initial_release_date": "2024-08-14T12:48:03Z",
"revision_history": [
{
"date": "2024-08-14T12:48:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"product_id": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"product_id": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1d-150200.11.94.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.i586",
"product_id": "libopenssl1_1-1.1.1d-150200.11.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.i586",
"product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-150200.11.94.1.i586",
"product": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.i586",
"product_id": "openssl-1_1-1.1.1d-150200.11.94.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"product_id": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"product_id": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"product_id": "openssl-1_1-1.1.1d-150200.11.94.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"product_id": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.1:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Micro 5.2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_1-devel-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_1-hmac-32bit-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-1.1.1d-150200.11.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_1-doc-1.1.1d-150200.11.94.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-14T12:48:03Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2761-1
Vulnerability from csaf_suse
Published
2024-08-06 05:18
Modified
2024-08-06 05:18
Summary
Security update for openssl-3-livepatches
Notes
Title of the patch
Security update for openssl-3-livepatches
Description of the patch
This update for openssl-3-livepatches fixes the following issues:
- CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227147).
Patchnames
SUSE-2024-2761,SUSE-SLE-Module-Live-Patching-15-SP6-2024-2761
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3-livepatches",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3-livepatches fixes the following issues:\n\n\n- CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227147).",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2761,SUSE-SLE-Module-Live-Patching-15-SP6-2024-2761",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2761-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2761-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242761-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2761-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-August/036318.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227147",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-3-livepatches",
"tracking": {
"current_release_date": "2024-08-06T05:18:23Z",
"generator": {
"date": "2024-08-06T05:18:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2761-1",
"initial_release_date": "2024-08-06T05:18:23Z",
"revision_history": [
{
"date": "2024-08-06T05:18:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openssl-3-livepatches-0.1-150600.13.3.1.x86_64",
"product": {
"name": "openssl-3-livepatches-0.1-150600.13.3.1.x86_64",
"product_id": "openssl-3-livepatches-0.1-150600.13.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-livepatches-0.1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:openssl-3-livepatches-0.1-150600.13.3.1.x86_64"
},
"product_reference": "openssl-3-livepatches-0.1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:openssl-3-livepatches-0.1-150600.13.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:openssl-3-livepatches-0.1-150600.13.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:openssl-3-livepatches-0.1-150600.13.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-06T05:18:23Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:3119-1
Vulnerability from csaf_suse
Published
2024-09-03 15:10
Modified
2024-09-03 15:10
Summary
Security update for openssl-1_0_0
Notes
Title of the patch
Security update for openssl-1_0_0
Description of the patch
This update for openssl-1_0_0 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)
Patchnames
SUSE-2024-3119,SUSE-SLE-Module-Legacy-15-SP5-2024-3119,SUSE-SLE-Module-Legacy-15-SP6-2024-3119,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3119,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3119,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3119,SUSE-Storage-7.1-2024-3119,openSUSE-SLE-15.5-2024-3119,openSUSE-SLE-15.6-2024-3119
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_0_0",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_0_0 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-3119,SUSE-SLE-Module-Legacy-15-SP5-2024-3119,SUSE-SLE-Module-Legacy-15-SP6-2024-3119,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3119,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3119,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3119,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3119,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3119,SUSE-Storage-7.1-2024-3119,openSUSE-SLE-15.5-2024-3119,openSUSE-SLE-15.6-2024-3119",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3119-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:3119-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243119-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:3119-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-September/036752.html"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE Bug 1227227",
"url": "https://bugzilla.suse.com/1227227"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_0_0",
"tracking": {
"current_release_date": "2024-09-03T15:10:41Z",
"generator": {
"date": "2024-09-03T15:10:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:3119-1",
"initial_release_date": "2024-09-03T15:10:41Z",
"revision_history": [
{
"date": "2024-09-03T15:10:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"product_id": "libopenssl10-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"product_id": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"product_id": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"product_id": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"product": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"product_id": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_0_0-devel-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product_id": "libopenssl-1_0_0-devel-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-hmac-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-hmac-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_0_0-steam-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32",
"product_id": "libopenssl1_0_0-steam-64bit-1.0.2p-150000.3.94.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.i586",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl10-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.i586",
"product_id": "libopenssl10-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.i586",
"product_id": "libopenssl1_0_0-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.i586",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.i586",
"product_id": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.i586",
"product_id": "openssl-1_0_0-1.0.2p-150000.3.94.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.i586",
"product": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.i586",
"product_id": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"product": {
"name": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"product_id": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"product": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"product_id": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"product_id": "libopenssl10-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"product_id": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"product_id": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"product_id": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"product": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"product_id": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl10-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"product_id": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"product_id": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"product": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"product_id": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
},
"product_reference": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl10-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64"
},
"product_reference": "openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
},
"product_reference": "openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Enterprise Storage 7.1:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.5:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.5:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl10-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.aarch64",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.s390x",
"openSUSE Leap 15.6:openssl-1_0_0-cavs-1.0.2p-150000.3.94.1.x86_64",
"openSUSE Leap 15.6:openssl-1_0_0-doc-1.0.2p-150000.3.94.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-03T15:10:41Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2953-1
Vulnerability from csaf_suse
Published
2024-08-19 07:22
Modified
2024-08-19 07:22
Summary
Security update for openssl-1_1
Notes
Title of the patch
Security update for openssl-1_1
Description of the patch
This update for openssl-1_1 fixes the following issues:
- CVE-2024-2511: Fixed a denial of service due to unbounded memory growth with session handling in TLSv1.3 (bsc#1222548)
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Patchnames
SUSE-2024-2953,SUSE-SLE-SDK-12-SP5-2024-2953,SUSE-SLE-SERVER-12-SP5-2024-2953
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2024-2511: Fixed a denial of service due to unbounded memory growth with session handling in TLSv1.3 (bsc#1222548)\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2953,SUSE-SLE-SDK-12-SP5-2024-2953,SUSE-SLE-SERVER-12-SP5-2024-2953",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2953-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2953-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242953-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2953-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html"
},
{
"category": "self",
"summary": "SUSE Bug 1222548",
"url": "https://bugzilla.suse.com/1222548"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2511 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2024-08-19T07:22:16Z",
"generator": {
"date": "2024-08-19T07:22:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2953-1",
"initial_release_date": "2024-08-19T07:22:16Z",
"revision_history": [
{
"date": "2024-08-19T07:22:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.aarch64",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.aarch64",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.aarch64",
"product_id": "openssl-1_1-1.1.1d-2.110.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1d-2.110.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1d-2.110.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1d-2.110.2.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1d-2.110.2.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.i586",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.i586",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.i586",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.i586",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.i586",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.i586",
"product_id": "openssl-1_1-1.1.1d-2.110.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1d-2.110.2.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1d-2.110.2.noarch",
"product_id": "openssl-1_1-doc-1.1.1d-2.110.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.ppc64le",
"product_id": "openssl-1_1-1.1.1d-2.110.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.s390",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.s390",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.s390"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.s390",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.s390",
"product_id": "openssl-1_1-1.1.1d-2.110.2.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.s390x",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.s390x",
"product_id": "openssl-1_1-1.1.1d-2.110.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl1_1-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1d-2.110.2.x86_64",
"product": {
"name": "openssl-1_1-1.1.1d-2.110.2.x86_64",
"product_id": "openssl-1_1-1.1.1d-2.110.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1d-2.110.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64"
},
"product_reference": "openssl-1_1-1.1.1d-2.110.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2511"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2511",
"url": "https://www.suse.com/security/cve/CVE-2024-2511"
},
{
"category": "external",
"summary": "SUSE Bug 1222548 for CVE-2024-2511",
"url": "https://bugzilla.suse.com/1222548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-19T07:22:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libopenssl1_1-hmac-32bit-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:openssl-1_1-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-1.1.1d-2.110.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libopenssl-1_1-devel-32bit-1.1.1d-2.110.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-19T07:22:16Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2933-1
Vulnerability from csaf_suse
Published
2024-08-15 10:12
Modified
2024-08-15 10:12
Summary
Security update for openssl-1_1
Notes
Title of the patch
Security update for openssl-1_1
Description of the patch
This update for openssl-1_1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng. (bsc#1226463)
- Fixed C99 violations to allow the package to build with GCC 14. (bsc#1225907)
Patchnames
SUSE-2024-2933,SUSE-SLE-Module-Basesystem-15-SP6-2024-2933,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2933,SUSE-SLE-Module-Legacy-15-SP6-2024-2933,openSUSE-SLE-15.6-2024-2933
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\nOther fixes:\n- Build with no-afalgeng. (bsc#1226463)\n- Fixed C99 violations to allow the package to build with GCC 14. (bsc#1225907)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2933,SUSE-SLE-Module-Basesystem-15-SP6-2024-2933,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2933,SUSE-SLE-Module-Legacy-15-SP6-2024-2933,openSUSE-SLE-15.6-2024-2933",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2933-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2933-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242933-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2933-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html"
},
{
"category": "self",
"summary": "SUSE Bug 1225907",
"url": "https://bugzilla.suse.com/1225907"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2024-08-15T10:12:52Z",
"generator": {
"date": "2024-08-15T10:12:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2933-1",
"initial_release_date": "2024-08-15T10:12:52Z",
"revision_history": [
{
"date": "2024-08-15T10:12:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"product_id": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"product_id": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1w-150600.5.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.i586",
"product_id": "libopenssl1_1-1.1.1w-150600.5.6.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1w-150600.5.6.1.i586",
"product": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.i586",
"product_id": "openssl-1_1-1.1.1w-150600.5.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"product_id": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"product_id": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"product_id": "openssl-1_1-1.1.1w-150600.5.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"product_id": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"product_id": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl-1_1-devel-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl-1_1-devel-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:libopenssl1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:libopenssl1_1-32bit-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.aarch64",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.ppc64le",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.s390x",
"openSUSE Leap 15.6:openssl-1_1-1.1.1w-150600.5.6.1.x86_64",
"openSUSE Leap 15.6:openssl-1_1-doc-1.1.1w-150600.5.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-15T10:12:52Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
suse-su-2024:2891-1
Vulnerability from csaf_suse
Published
2024-08-13 09:39
Modified
2024-08-13 09:39
Summary
Security update for openssl-1_1
Notes
Title of the patch
Security update for openssl-1_1
Description of the patch
This update for openssl-1_1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
Patchnames
SUSE-2024-2891,SUSE-SLE-Micro-5.5-2024-2891,SUSE-SLE-Module-Basesystem-15-SP5-2024-2891,openSUSE-Leap-Micro-5.5-2024-2891,openSUSE-SLE-15.5-2024-2891
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-1_1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-1_1 fixes the following issues:\n\n- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)\n\nOther fixes:\n- Build with no-afalgeng (bsc#1226463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2891,SUSE-SLE-Micro-5.5-2024-2891,SUSE-SLE-Module-Basesystem-15-SP5-2024-2891,openSUSE-Leap-Micro-5.5-2024-2891,openSUSE-SLE-15.5-2024-2891",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2891-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2891-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242891-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2891-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226463",
"url": "https://bugzilla.suse.com/1226463"
},
{
"category": "self",
"summary": "SUSE Bug 1227138",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-5535 page",
"url": "https://www.suse.com/security/cve/CVE-2024-5535/"
}
],
"title": "Security update for openssl-1_1",
"tracking": {
"current_release_date": "2024-08-13T09:39:54Z",
"generator": {
"date": "2024-08-13T09:39:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2891-1",
"initial_release_date": "2024-08-13T09:39:54Z",
"revision_history": [
{
"date": "2024-08-13T09:39:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"product": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"product_id": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"product": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"product_id": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product_id": "libopenssl-1_1-devel-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product_id": "libopenssl1_1-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product": {
"name": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32",
"product_id": "libopenssl1_1-hmac-64bit-1.1.1l-150500.17.34.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.i586",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.i586",
"product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.i586",
"product": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.i586",
"product_id": "libopenssl1_1-1.1.1l-150500.17.34.1.i586"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.i586",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.i586",
"product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.i586"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150500.17.34.1.i586",
"product": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.i586",
"product_id": "openssl-1_1-1.1.1l-150500.17.34.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"product": {
"name": "openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"product_id": "openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"product": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"product_id": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"product": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"product_id": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"product": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"product_id": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"product": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"product_id": "openssl-1_1-1.1.1l-150500.17.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"product_id": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"product": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"product_id": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.5",
"product": {
"name": "openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap Micro 5.5",
"product_id": "openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
},
"product_reference": "openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch"
},
"product_reference": "openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-5535"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an\nempty supported client protocols buffer may cause a crash or memory contents to\nbe sent to the peer.\n\nImpact summary: A buffer overread can have a range of potential consequences\nsuch as unexpected application beahviour or a crash. In particular this issue\ncould result in up to 255 bytes of arbitrary private data from memory being sent\nto the peer leading to a loss of confidentiality. However, only applications\nthat directly call the SSL_select_next_proto function with a 0 length list of\nsupported client protocols are affected by this issue. This would normally never\nbe a valid scenario and is typically not under attacker control but may occur by\naccident in the case of a configuration or programming error in the calling\napplication.\n\nThe OpenSSL API function SSL_select_next_proto is typically used by TLS\napplications that support ALPN (Application Layer Protocol Negotiation) or NPN\n(Next Protocol Negotiation). NPN is older, was never standardised and\nis deprecated in favour of ALPN. We believe that ALPN is significantly more\nwidely deployed than NPN. The SSL_select_next_proto function accepts a list of\nprotocols from the server and a list of protocols from the client and returns\nthe first protocol that appears in the server list that also appears in the\nclient list. In the case of no overlap between the two lists it returns the\nfirst item in the client list. In either case it will signal whether an overlap\nbetween the two lists was found. In the case where SSL_select_next_proto is\ncalled with a zero length client list it fails to notice this condition and\nreturns the memory immediately following the client list pointer (and reports\nthat there was no overlap in the lists).\n\nThis function is typically called from a server side application callback for\nALPN or a client side application callback for NPN. In the case of ALPN the list\nof protocols supplied by the client is guaranteed by libssl to never be zero in\nlength. The list of server protocols comes from the application and should never\nnormally be expected to be of zero length. In this case if the\nSSL_select_next_proto function has been called as expected (with the list\nsupplied by the client passed in the client/client_len parameters), then the\napplication will not be vulnerable to this issue. If the application has\naccidentally been configured with a zero length server list, and has\naccidentally passed that zero length server list in the client/client_len\nparameters, and has additionally failed to correctly handle a \"no overlap\"\nresponse (which would normally result in a handshake failure in ALPN) then it\nwill be vulnerable to this problem.\n\nIn the case of NPN, the protocol permits the client to opportunistically select\na protocol when there is no overlap. OpenSSL returns the first client protocol\nin the no overlap case in support of this. The list of client protocols comes\nfrom the application and should never normally be expected to be of zero length.\nHowever if the SSL_select_next_proto function is accidentally called with a\nclient_len of 0 then an invalid memory pointer will be returned instead. If the\napplication uses this output as the opportunistic protocol then the loss of\nconfidentiality will occur.\n\nThis issue has been assessed as Low severity because applications are most\nlikely to be vulnerable if they are using NPN instead of ALPN - but NPN is not\nwidely used. It also requires an application configuration or programming error.\nFinally, this issue would not typically be under attacker control making active\nexploitation unlikely.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.\n\nDue to the low severity of this issue we are not issuing new releases of\nOpenSSL at this time. The fix will be included in the next releases when they\nbecome available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-5535",
"url": "https://www.suse.com/security/cve/CVE-2024-5535"
},
{
"category": "external",
"summary": "SUSE Bug 1227138 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227138"
},
{
"category": "external",
"summary": "SUSE Bug 1227147 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227147"
},
{
"category": "external",
"summary": "SUSE Bug 1227233 for CVE-2024-5535",
"url": "https://bugzilla.suse.com/1227233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.ppc64le",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap 15.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap 15.5:openssl-1_1-doc-1.1.1l-150500.17.34.1.noarch",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl-1_1-devel-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:libopenssl1_1-hmac-1.1.1l-150500.17.34.1.x86_64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.aarch64",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.s390x",
"openSUSE Leap Micro 5.5:openssl-1_1-1.1.1l-150500.17.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T09:39:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-5535"
}
]
}
wid-sec-w-2024-3412
Vulnerability from csaf_certbund
Published
2024-11-12 23:00
Modified
2024-11-12 23:00
Summary
Microsoft Defender for Endpoint: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Microsoft Defender ist eine Software zur Erkennung von schädlicher Software (Malware).
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Defender for Endpoint ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Android
- iPhoneOS
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft Defender ist eine Software zur Erkennung von sch\u00e4dlicher Software (Malware).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Defender for Endpoint ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android\n- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3412 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3412.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3412 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3412"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
}
],
"source_lang": "en-US",
"title": "Microsoft Defender for Endpoint: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2024-11-12T23:00:00.000+00:00",
"generator": {
"date": "2024-11-13T09:16:23.519+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3412",
"initial_release_date": "2024-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for Endpoint for Android",
"product": {
"name": "Microsoft Defender for Endpoint for Android",
"product_id": "T022265",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:defender:for_endpoint_for_android"
}
}
},
{
"category": "product_version",
"name": "for Endpoint for iOS",
"product": {
"name": "Microsoft Defender for Endpoint for iOS",
"product_id": "T039030",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:defender:for_endpoint_for_ios"
}
}
}
],
"category": "product_name",
"name": "Defender"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Microsoft Defender for Endpoint f\u00fcr Android und f\u00fcr iOS. Ursache ist ein Puffer\u00fcberlauf in der Funktion SSL_select_next_proto der verwendeten OpenSSL Komponente. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er einen speziell gestalteten Link oder eine E-Mail an den Benutzer sendet, um beliebigen Code auszuf\u00fchren. Je nach genutztem Angriffsvektor kann eine Nutzeraktion erforderlich sein oder nicht."
}
],
"product_status": {
"known_affected": [
"T039030",
"T022265"
]
},
"release_date": "2024-11-12T23:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
WID-SEC-W-2024-1469
Vulnerability from csaf_certbund
Published
2024-06-26 22:00
Modified
2025-08-04 22:00
Summary
OpenSSL: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenSSL ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuführen und Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1469 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1469.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1469 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1469"
},
{
"category": "external",
"summary": "OpenSSL Security Advisory vom 2024-06-26",
"url": "https://www.openssl.org/news/secadv/20240627.txt"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2591 vom 2024-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2635-1 vom 2024-07-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EAYPMV3WQ7VYZOAFKQ3QLIE6JSVJEI32/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162032 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162032"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6937-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6937-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2761-1 vom 2024-08-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2891-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2604 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2604.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2621 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2621.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2909-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2927-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2931-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2933-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2953-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2989-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2991-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3019-1 vom 2024-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROZGZZCD7XE2EPPAZ2CXAEPDXGEWCU5O/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3019-1 vom 2024-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ROZGZZCD7XE2EPPAZ2CXAEPDXGEWCU5O/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3119-1 vom 2024-09-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019346.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-7D5C1BCC78 vom 2024-09-12",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7d5c1bcc78"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASOPENSSL-SNAPSAFE-2024-006 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASOPENSSL-SNAPSAFE-2024-006.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7848 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7848"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7846 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7846"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7847 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7847"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7848 vom 2024-10-10",
"url": "https://linux.oracle.com/errata/ELSA-2024-7848.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173018 vom 2024-10-14",
"url": "https://www.ibm.com/support/pages/node/7173018"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12786 vom 2024-10-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-12786.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3942 vom 2024-10-31",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9333 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9333"
},
{
"category": "external",
"summary": "Insyde Security Advisory INSYDE-SA-2024012 vom 2024-11-12",
"url": "https://www.insyde.com/security-pledge/SA-2024012"
},
{
"category": "external",
"summary": "HPE Security Bulletin vom 2024-11-14",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04744en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
"url": "https://www.ibm.com/support/pages/node/7178065"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-150 vom 2024-12-17",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-150/index.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10990 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2024:10990"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2025-107 vom 2025-01-29",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-107/index.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182192 vom 2025-01-31",
"url": "https://www.ibm.com/support/pages/node/7182192"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2744 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2744.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2743 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2743.html"
},
{
"category": "external",
"summary": "SolarWinds Platform 2025.1 release notes vom 2025-02-11",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183572 vom 2025-02-18",
"url": "https://www.ibm.com/support/pages/node/7183572"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2025-9176CC66C2 vom 2025-02-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-9176cc66c2"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182395 vom 2025-03-04",
"url": "https://www.ibm.com/support/pages/node/7182395"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185261 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185261"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7184919 vom 2025-03-28",
"url": "https://www.ibm.com/support/pages/node/7184919"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3452 vom 2025-04-03",
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3453 vom 2025-04-02",
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3666 vom 2025-04-08",
"url": "https://access.redhat.com/errata/RHSA-2025:3666"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-020 vom 2025-04-10",
"url": "https://www.dell.com/support/kbdoc/000250484"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
"url": "https://www.ibm.com/support/pages/node/7230557"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-011 vom 2025-05-23",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-011-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-010 vom 2025-05-23",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-010-for-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20014-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-255 vom 2025-06-24",
"url": "https://www.dell.com/support/kbdoc/000335103"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service und Offenlegung von Informationen",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:20:05.280+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1469",
"initial_release_date": "2024-06-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-27T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-22T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Insyde aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "45"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T035626",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
},
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T036868",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "T40",
"product": {
"name": "Dell PowerEdge T40",
"product_id": "T027537",
"product_identification_helper": {
"cpe": "cpe:/h:dell:poweredge:t40"
}
}
}
],
"category": "product_name",
"name": "PowerEdge"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "OpenSSL Software \u003cA.03.00.15.001",
"product": {
"name": "HPE HP-UX OpenSSL Software \u003cA.03.00.15.001",
"product_id": "T039192"
}
},
{
"category": "product_version",
"name": "OpenSSL Software A.03.00.15.001",
"product": {
"name": "HPE HP-UX OpenSSL Software A.03.00.15.001",
"product_id": "T039192-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:openssl_software__a.03.00.15.001"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T038840",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.3-00",
"product": {
"name": "Hitachi Ops Center \u003c11.0.3-00",
"product_id": "T039867"
}
},
{
"category": "product_version",
"name": "11.0.3-00",
"product": {
"name": "Hitachi Ops Center 11.0.3-00",
"product_id": "T039867-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:11.0.3-00"
}
}
}
],
"category": "product_name",
"name": "Ops Center"
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "Certified Container",
"product": {
"name": "IBM App Connect Enterprise Certified Container",
"product_id": "T037907",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Information Server"
},
{
"category": "product_name",
"name": "IBM MQ",
"product": {
"name": "IBM MQ",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "v10",
"product": {
"name": "IBM Power Hardware Management Console v10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0.27",
"product": {
"name": "IBM Rational Build Forge \u003c8.0.0.27",
"product_id": "T038286"
}
},
{
"category": "product_version",
"name": "8.0.0.27",
"product": {
"name": "IBM Rational Build Forge 8.0.0.27",
"product_id": "T038286-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27"
}
}
}
],
"category": "product_name",
"name": "Rational Build Forge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.1.0.8",
"product": {
"name": "IBM Rational ClearCase \u003c9.1.0.8",
"product_id": "T041577"
}
},
{
"category": "product_version",
"name": "9.1.0.8",
"product": {
"name": "IBM Rational ClearCase 9.1.0.8",
"product_id": "T041577-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:9.1.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.1.3",
"product": {
"name": "IBM Rational ClearCase \u003c10.0.1.3",
"product_id": "T041578"
}
},
{
"category": "product_version",
"name": "10.0.1.3",
"product": {
"name": "IBM Rational ClearCase 10.0.1.3",
"product_id": "T041578-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:10.0.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.0.3",
"product": {
"name": "IBM Rational ClearCase \u003c11.0.0.3",
"product_id": "T041579"
}
},
{
"category": "product_version",
"name": "11.0.0.3",
"product": {
"name": "IBM Rational ClearCase 11.0.0.3",
"product_id": "T041579-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:11.0.0.3"
}
}
}
],
"category": "product_name",
"name": "Rational ClearCase"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.7",
"product": {
"name": "IBM Rational ClearQuest \u003c10.0.7",
"product_id": "T041698"
}
},
{
"category": "product_version",
"name": "10.0.7",
"product": {
"name": "IBM Rational ClearQuest 10.0.7",
"product_id": "T041698-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearquest:10.0.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003cFix Pack 8 (9.1.0.8) for 9.1",
"product": {
"name": "IBM Rational ClearQuest \u003cFix Pack 8 (9.1.0.8) for 9.1",
"product_id": "T041699"
}
},
{
"category": "product_version",
"name": "Fix Pack 8 (9.1.0.8) for 9.1",
"product": {
"name": "IBM Rational ClearQuest Fix Pack 8 (9.1.0.8) for 9.1",
"product_id": "T041699-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearquest:fix_pack_8_%289.1.0.8%29_for_9.1"
}
}
}
],
"category": "product_name",
"name": "Rational ClearQuest"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17",
"product_id": "T042730"
}
},
{
"category": "product_version",
"name": "10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17",
"product_id": "T042730-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cRV24.06.3",
"product": {
"name": "Insyde UEFI Firmware \u003cRV24.06.3",
"product_id": "T038993"
}
},
{
"category": "product_version",
"name": "RV24.06.3",
"product": {
"name": "Insyde UEFI Firmware RV24.06.3",
"product_id": "T038993-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv24.06.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003cRV23.08.1",
"product": {
"name": "Insyde UEFI Firmware \u003cRV23.08.1",
"product_id": "T038994"
}
},
{
"category": "product_version",
"name": "RV23.08.1",
"product": {
"name": "Insyde UEFI Firmware RV23.08.1",
"product_id": "T038994-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv23.08.1"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.3.2",
"product": {
"name": "Open Source OpenSSL \u003c3.3.2",
"product_id": "T035672"
}
},
{
"category": "product_version",
"name": "3.3.2",
"product": {
"name": "Open Source OpenSSL 3.3.2",
"product_id": "T035672-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.3.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.2.3",
"product": {
"name": "Open Source OpenSSL \u003c3.2.3",
"product_id": "T035673"
}
},
{
"category": "product_version",
"name": "3.2.3",
"product": {
"name": "Open Source OpenSSL 3.2.3",
"product_id": "T035673-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.1.7",
"product": {
"name": "Open Source OpenSSL \u003c3.1.7",
"product_id": "T035674"
}
},
{
"category": "product_version",
"name": "3.1.7",
"product": {
"name": "Open Source OpenSSL 3.1.7",
"product_id": "T035674-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.1.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.0.15",
"product": {
"name": "Open Source OpenSSL \u003c3.0.15",
"product_id": "T035675"
}
},
{
"category": "product_version",
"name": "3.0.15",
"product": {
"name": "Open Source OpenSSL 3.0.15",
"product_id": "T035675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.0.15"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.1.1za",
"product": {
"name": "Open Source OpenSSL \u003c1.1.1za",
"product_id": "T035676"
}
},
{
"category": "product_version",
"name": "1.1.1za",
"product": {
"name": "Open Source OpenSSL 1.1.1za",
"product_id": "T035676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:1.1.1za"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.0.2zk",
"product": {
"name": "Open Source OpenSSL \u003c1.0.2zk",
"product_id": "T035677"
}
},
{
"category": "product_version",
"name": "1.0.2zk",
"product": {
"name": "Open Source OpenSSL 1.0.2zk",
"product_id": "T035677-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:1.0.2zk"
}
}
}
],
"category": "product_name",
"name": "OpenSSL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.62",
"product": {
"name": "Red Hat JBoss Core Services \u003c2.4.62",
"product_id": "T042316"
}
},
{
"category": "product_version",
"name": "2.4.62",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62",
"product_id": "T042316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:2.4.62"
}
}
}
],
"category": "product_name",
"name": "JBoss Core Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Logging \u003c5.9.10",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.9.10",
"product_id": "T040352"
}
},
{
"category": "product_version",
"name": "Logging 5.9.10",
"product": {
"name": "Red Hat OpenShift Logging 5.9.10",
"product_id": "T040352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.9.10"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.1",
"product": {
"name": "SolarWinds Platform \u003c2025.1",
"product_id": "T040952"
}
},
{
"category": "product_version",
"name": "2025.1",
"product": {
"name": "SolarWinds Platform 2025.1",
"product_id": "T040952-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:orion_platform:2025.1"
}
}
}
],
"category": "product_name",
"name": "Platform"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Xerox FreeFlow Print Server 7",
"product_id": "T000872",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:7"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T035677",
"67646",
"T036868",
"T035672",
"T002977",
"T036688",
"T004914",
"T035676",
"T035675",
"T038741",
"T038840",
"T035674",
"T035673",
"1139691",
"T042730",
"T038286",
"T039192",
"T027537",
"T031092",
"T042316",
"T000872",
"T040952",
"398363",
"T037907",
"T023373",
"T040352",
"434967",
"T035626",
"1039165",
"1522854",
"T039867",
"74185",
"T038994",
"T038993",
"T045853",
"T044962",
"T045852",
"T044961",
"T045854",
"2951",
"T002207",
"T000126",
"444803",
"T041579",
"T041578",
"T041699",
"T041577",
"T041698"
]
},
"release_date": "2024-06-26T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
WID-SEC-W-2024-2112
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2025-08-04 22:00
Summary
Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
InsydeH2O UEFI BIOS ist eine proprietäre, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterstützt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "InsydeH2O UEFI BIOS ist eine propriet\u00e4re, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterst\u00fctzt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2112 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2112.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2112 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2112"
},
{
"category": "external",
"summary": "Insyde Security Pledge INSYDE-SA-2024009 vom 2024-09-10",
"url": "https://www.insyde.com/security-pledge/SA-2024009"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04758en_us\u0026hprpt_id=ALERT_HPE_3075763\u0026jumpid=em_pom8nu6hj_aid-521053889"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-020 vom 2025-01-14",
"url": "https://www.dell.com/support/kbdoc/de-de/000250484/dsa-2025-020"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-036 vom 2025-04-16",
"url": "https://www.dell.com/support/kbdoc/000269129"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Insyde UEFI Firmware: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:20:29.580+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-2112",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T032770",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
},
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T041253",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
}
],
"category": "product_name",
"name": "BIOS"
},
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "OpenSSL \u003c3.2.1",
"product": {
"name": "Insyde UEFI Firmware OpenSSL \u003c3.2.1",
"product_id": "T037494"
}
},
{
"category": "product_version",
"name": "OpenSSL 3.2.1",
"product": {
"name": "Insyde UEFI Firmware OpenSSL 3.2.1",
"product_id": "T037494-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:openssl__3.2.1"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5678",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
wid-sec-w-2024-3674
Vulnerability from csaf_certbund
Published
2024-12-10 23:00
Modified
2024-12-10 23:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen oder unspezifische Angriffe durchzuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren oder unspezifische Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3674 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3674.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3674 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3674"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1201 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1201"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1202 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1202"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1203 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1203"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1204 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1204"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1205 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1205"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1206 vom 2024-12-10",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1206"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1207 vom 2024-12-10",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1207"
}
],
"source_lang": "en-US",
"title": "Splunk Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-10T23:00:00.000+00:00",
"generator": {
"date": "2024-12-11T12:11:56.562+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3674",
"initial_release_date": "2024-12-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.3.2",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.2",
"product_id": "T039778"
}
},
{
"category": "product_version",
"name": "9.3.2",
"product": {
"name": "Splunk Splunk Enterprise 9.3.2",
"product_id": "T039778-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.4",
"product_id": "T039779"
}
},
{
"category": "product_version",
"name": "9.2.4",
"product": {
"name": "Splunk Splunk Enterprise 9.2.4",
"product_id": "T039779-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.7",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.7",
"product_id": "T039780"
}
},
{
"category": "product_version",
"name": "9.1.7",
"product": {
"name": "Splunk Splunk Enterprise 9.1.7",
"product_id": "T039780-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.7"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2024-25710",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-36114",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-36129",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-36129"
},
{
"cve": "CVE-2024-4067",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-4067"
},
{
"cve": "CVE-2024-42459",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42459"
},
{
"cve": "CVE-2024-42460",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42460"
},
{
"cve": "CVE-2024-42461",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-42461"
},
{
"cve": "CVE-2024-45296",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6531",
"notes": [
{
"category": "description",
"text": "In Splunk Enterprise existieren mehrere Schwachstellen. Diese Fehler existieren in verschiedenen Komponenten von Drittanbietern, wie z.B. Apache Common Compress, Micromatch oder OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um mehrere Arten von Angriffen auszuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-6531"
},
{
"cve": "CVE-2024-53243",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsachgem\u00e4\u00dfen Zugriffskontrolle in den Endpunkten der Key Value Store (KVstore)-Sammlungen in der Secure Gateway App. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen zu Suchanfragen f\u00fcr Alarme anzuzeigen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53243"
},
{
"cve": "CVE-2024-53244",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Handhabung von Berechtigungen im Berichtsendpunkt in der Cloud-Plattform. Indem er einen Benutzer mit h\u00f6heren Rechten dazu bringt, eine Anfrage in seinem Browser zu initiieren, kann ein entfernter, authentifizierter Angreifer diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen und gespeicherte Suchen mit beliebigen Befehlen auszuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53244"
},
{
"cve": "CVE-2024-53245",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen unsachgem\u00e4\u00dfer Zugriffskontrolle in der Komponente zum Klonen von Dashboards in der Cloud Platform. Ein entfernter authentifizierter Angreifer mit einem Benutzerkonto mit geringen Rechten, das denselben Namen wie eine Rolle mit Lesezugriff auf ein Dashboard hat, kann diese Schwachstelle ausnutzen, um den Dashboard-Namen und die XML-Konfiguration durch Klonen des Dashboards anzuzeigen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53245"
},
{
"cve": "CVE-2024-53246",
"notes": [
{
"category": "description",
"text": "Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Behandlung von SPL-Befehlen in der Suchverarbeitungskomponente in der Cloud-Plattform. Ein entfernter, anonymer Angreifer kann diese Schwachstelle in Kombination mit anderen Schwachstellen ausnutzen, um Zugang zu sensiblen Informationen zu erhalten. Zur erfolgreichen Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53246"
},
{
"cve": "CVE-2024-53247",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Dieser Fehler existiert wegen einer unsicheren Deserialisierung von Daten in der jsonpickle Python-Bibliothek, die von der Secure Gateway-Anwendung verwendet wird. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen."
}
],
"product_status": {
"known_affected": [
"T039780",
"T039779",
"T039778"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53247"
}
]
}
wid-sec-w-2025-0225
Vulnerability from csaf_certbund
Published
2025-01-30 23:00
Modified
2025-08-04 22:00
Summary
Dell PowerProtect Data Domain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell PowerProtect Data Domain Appliances sind speziell für Backup und Daten-Deduplizierung ausgelegte Systeme.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erhöhte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuführen und einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- Sonstiges
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0225 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0225 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:21:04.568+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0225",
"initial_release_date": "2025-01-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
"product_id": "T040718"
}
},
{
"category": "product_version",
"name": "8.3.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.0.0",
"product_id": "T040718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
"product_id": "T040719"
}
},
{
"category": "product_version",
"name": "7.13.1.20",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.20",
"product_id": "T040719-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
"product_id": "T040721"
}
},
{
"category": "product_version",
"name": "7.10.1.50",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.50",
"product_id": "T040721-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2013-4235"
},
{
"cve": "CVE-2015-8100",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2017-9271",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2017-9271"
},
{
"cve": "CVE-2018-6798",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6798"
},
{
"cve": "CVE-2018-6913",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2018-6913"
},
{
"cve": "CVE-2019-20633",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20633"
},
{
"cve": "CVE-2019-20892",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2020-12762",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-15861",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2021-3521",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-3521"
},
{
"cve": "CVE-2021-37750",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-37750"
},
{
"cve": "CVE-2021-46933",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46933"
},
{
"cve": "CVE-2021-46955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-46955"
},
{
"cve": "CVE-2021-47074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47074"
},
{
"cve": "CVE-2021-47113",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47113"
},
{
"cve": "CVE-2021-47131",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47131"
},
{
"cve": "CVE-2021-47162",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47162"
},
{
"cve": "CVE-2021-47171",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47171"
},
{
"cve": "CVE-2021-47188",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47188"
},
{
"cve": "CVE-2021-47206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47206"
},
{
"cve": "CVE-2021-47220",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47220"
},
{
"cve": "CVE-2021-47229",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47229"
},
{
"cve": "CVE-2021-47231",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47231"
},
{
"cve": "CVE-2021-47235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2021-47235"
},
{
"cve": "CVE-2022-2601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-44792",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-48566",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2022-48566"
},
{
"cve": "CVE-2023-27043",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2023-28074",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-28074"
},
{
"cve": "CVE-2023-3164",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-3164"
},
{
"cve": "CVE-2023-36632",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-36632"
},
{
"cve": "CVE-2023-4421",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4421"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45733",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45733"
},
{
"cve": "CVE-2023-45745",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45745"
},
{
"cve": "CVE-2023-45918",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-45918"
},
{
"cve": "CVE-2023-46103",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-46103"
},
{
"cve": "CVE-2023-4692",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-4692"
},
{
"cve": "CVE-2023-47233",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47233"
},
{
"cve": "CVE-2023-47855",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-47855"
},
{
"cve": "CVE-2023-49083",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-50782",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2023-52428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52428"
},
{
"cve": "CVE-2023-52527",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52527"
},
{
"cve": "CVE-2023-52586",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52586"
},
{
"cve": "CVE-2023-52591",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52591"
},
{
"cve": "CVE-2023-52646",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52646"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52655"
},
{
"cve": "CVE-2023-52664",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52664"
},
{
"cve": "CVE-2023-52685",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52685"
},
{
"cve": "CVE-2023-52686",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52686"
},
{
"cve": "CVE-2023-52691",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52691"
},
{
"cve": "CVE-2023-52696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52696"
},
{
"cve": "CVE-2023-52698",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52698"
},
{
"cve": "CVE-2023-52703",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52703"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52732",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52732"
},
{
"cve": "CVE-2023-52741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52741"
},
{
"cve": "CVE-2023-52742",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52742"
},
{
"cve": "CVE-2023-52747",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52747"
},
{
"cve": "CVE-2023-52759",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52759"
},
{
"cve": "CVE-2023-52774",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52774"
},
{
"cve": "CVE-2023-52781",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52781"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52821",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52821"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52865",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52865"
},
{
"cve": "CVE-2023-52867",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52867"
},
{
"cve": "CVE-2023-52875",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52875"
},
{
"cve": "CVE-2023-52880",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-52880"
},
{
"cve": "CVE-2023-5388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5752"
},
{
"cve": "CVE-2023-5992",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-5992"
},
{
"cve": "CVE-2023-6597",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-0639",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0639"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1737",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1737"
},
{
"cve": "CVE-2024-1975",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-1975"
},
{
"cve": "CVE-2024-2004",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-20696",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-20696"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-2398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-24577",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24577"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-25710",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26458",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26458"
},
{
"cve": "CVE-2024-26461",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-26625",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26625"
},
{
"cve": "CVE-2024-26739",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26739"
},
{
"cve": "CVE-2024-26752",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26752"
},
{
"cve": "CVE-2024-26775",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26775"
},
{
"cve": "CVE-2024-26791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26791"
},
{
"cve": "CVE-2024-26828",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26828"
},
{
"cve": "CVE-2024-26846",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26846"
},
{
"cve": "CVE-2024-26874",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26874"
},
{
"cve": "CVE-2024-26876",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26876"
},
{
"cve": "CVE-2024-26900",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-26915",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26915"
},
{
"cve": "CVE-2024-26920",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26920"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26929",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26929"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26931",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26931"
},
{
"cve": "CVE-2024-26934",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26934"
},
{
"cve": "CVE-2024-26957",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26957"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26984",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26984"
},
{
"cve": "CVE-2024-26996",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-26996"
},
{
"cve": "CVE-2024-27008",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27008"
},
{
"cve": "CVE-2024-27054",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27054"
},
{
"cve": "CVE-2024-27059",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27059"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27396",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27396"
},
{
"cve": "CVE-2024-27398",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27398"
},
{
"cve": "CVE-2024-27401",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27401"
},
{
"cve": "CVE-2024-27419",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27419"
},
{
"cve": "CVE-2024-27436",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-27436"
},
{
"cve": "CVE-2024-28085",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28085"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-32487",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-32487"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-33871",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-33871"
},
{
"cve": "CVE-2024-34062",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34062"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34459",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-34459"
},
{
"cve": "CVE-2024-35195",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-35235",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35235"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35791",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35791"
},
{
"cve": "CVE-2024-35809",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35809"
},
{
"cve": "CVE-2024-35811",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35811"
},
{
"cve": "CVE-2024-35830",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35830"
},
{
"cve": "CVE-2024-35849",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35849"
},
{
"cve": "CVE-2024-35877",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35877"
},
{
"cve": "CVE-2024-35878",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35887",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35887"
},
{
"cve": "CVE-2024-35895",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35895"
},
{
"cve": "CVE-2024-35914",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35914"
},
{
"cve": "CVE-2024-35932",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35932"
},
{
"cve": "CVE-2024-35935",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35935"
},
{
"cve": "CVE-2024-35936",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35936"
},
{
"cve": "CVE-2024-35944",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35944"
},
{
"cve": "CVE-2024-35955",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35955"
},
{
"cve": "CVE-2024-35969",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35969"
},
{
"cve": "CVE-2024-35982",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-35982"
},
{
"cve": "CVE-2024-36015",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36015"
},
{
"cve": "CVE-2024-36029",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36029"
},
{
"cve": "CVE-2024-3651",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-3651"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-39689",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-39689"
},
{
"cve": "CVE-2024-4032",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-41110",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-4317",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4317"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5206",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5206"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6232",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6655",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-53295",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53295"
},
{
"cve": "CVE-2024-51534",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-51534"
},
{
"cve": "CVE-2024-53296",
"product_status": {
"known_affected": [
"T045853",
"T040719",
"T045852",
"T040718",
"T045854",
"T000126",
"T040721",
"398363"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2024-53296"
}
]
}
wid-sec-w-2024-2112
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2025-08-04 22:00
Summary
Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
InsydeH2O UEFI BIOS ist eine proprietäre, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterstützt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "InsydeH2O UEFI BIOS ist eine propriet\u00e4re, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterst\u00fctzt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2112 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2112.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2112 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2112"
},
{
"category": "external",
"summary": "Insyde Security Pledge INSYDE-SA-2024009 vom 2024-09-10",
"url": "https://www.insyde.com/security-pledge/SA-2024009"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04758en_us\u0026hprpt_id=ALERT_HPE_3075763\u0026jumpid=em_pom8nu6hj_aid-521053889"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-020 vom 2025-01-14",
"url": "https://www.dell.com/support/kbdoc/de-de/000250484/dsa-2025-020"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-036 vom 2025-04-16",
"url": "https://www.dell.com/support/kbdoc/000269129"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Insyde UEFI Firmware: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:20:29.580+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-2112",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T032770",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
},
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T041253",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
}
],
"category": "product_name",
"name": "BIOS"
},
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "OpenSSL \u003c3.2.1",
"product": {
"name": "Insyde UEFI Firmware OpenSSL \u003c3.2.1",
"product_id": "T037494"
}
},
{
"category": "product_version",
"name": "OpenSSL 3.2.1",
"product": {
"name": "Insyde UEFI Firmware OpenSSL 3.2.1",
"product_id": "T037494-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:openssl__3.2.1"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5678",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2511",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T006498",
"T041253",
"T045853",
"T045852",
"T045854",
"T037494",
"T005119",
"T032770"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
wid-sec-w-2024-3188
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-11-12 23:00
Summary
Oracle MySQL: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
MySQL ist ein Open Source Datenbankserver von Oracle.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3188 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3188 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7102-1 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7102-1"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-12T23:00:00.000+00:00",
"generator": {
"date": "2024-11-13T09:16:37.317+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3188",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T034126",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "T036237",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21193",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7264"
}
]
}
WID-SEC-W-2024-3192
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3192 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3192.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3192 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3192"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Financial Services Applications vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixIFLX"
}
],
"source_lang": "en-US",
"title": "Oracle Financial Services Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-15T22:00:00.000+00:00",
"generator": {
"date": "2024-10-16T10:12:34.165+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3192",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 4.0.0.0.0",
"product_id": "T023933",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:4.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "19.2.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 19.2.0.0.0",
"product_id": "T028694",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:19.2.0.0.0"
}
}
},
{
"category": "product_version",
"name": "21.1.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 21.1.0.0.0",
"product_id": "T028695",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:21.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "22.1.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 22.1.0.0.0",
"product_id": "T028696",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:22.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "22.2.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 22.2.0.0.0",
"product_id": "T028697",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:22.2.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.7.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.0.0.0",
"product_id": "T028702",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.5.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.5.0.0.0",
"product_id": "T034160",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.6.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.6.0.0.0",
"product_id": "T034161",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.0.0"
}
}
},
{
"category": "product_version",
"name": "3.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 3.0.0.0.0",
"product_id": "T034165",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:3.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.4.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.4.0.0.0",
"product_id": "T036215",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.4.0.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.2.7",
"product": {
"name": "Oracle Financial Services Applications 8.1.2.7",
"product_id": "T036217",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.7"
}
}
},
{
"category": "product_version",
"name": "14.7.4.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.4.0.0",
"product_id": "T038391",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.4.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.2.8",
"product": {
"name": "Oracle Financial Services Applications 8.1.2.8",
"product_id": "T038392",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.8"
}
}
},
{
"category": "product_version",
"name": "14.7.5.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.5.0.0",
"product_id": "T038393",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.5.0.0"
}
}
},
{
"category": "product_version",
"name": "14.5.0.12.0",
"product": {
"name": "Oracle Financial Services Applications 14.5.0.12.0",
"product_id": "T038394",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.12.0"
}
}
},
{
"category": "product_version",
"name": "5.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 5.0.0.0.0",
"product_id": "T038395",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:5.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.7.0.6.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.0.6.0",
"product_id": "T038396",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.6.0"
}
}
}
],
"category": "product_name",
"name": "Financial Services Applications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-31160",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-31160"
},
{
"cve": "CVE-2023-34055",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-34055"
},
{
"cve": "CVE-2023-50447",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-50447"
},
{
"cve": "CVE-2024-0232",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-21281",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21281"
},
{
"cve": "CVE-2024-21284",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21284"
},
{
"cve": "CVE-2024-21285",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21285"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-2511",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-32007",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32007"
},
{
"cve": "CVE-2024-32114",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32114"
},
{
"cve": "CVE-2024-43407",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-43407"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
wid-sec-w-2024-3192
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-10-15 22:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3192 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3192.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3192 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3192"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Financial Services Applications vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixIFLX"
}
],
"source_lang": "en-US",
"title": "Oracle Financial Services Applications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-15T22:00:00.000+00:00",
"generator": {
"date": "2024-10-16T10:12:34.165+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3192",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 4.0.0.0.0",
"product_id": "T023933",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:4.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "19.2.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 19.2.0.0.0",
"product_id": "T028694",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:19.2.0.0.0"
}
}
},
{
"category": "product_version",
"name": "21.1.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 21.1.0.0.0",
"product_id": "T028695",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:21.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "22.1.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 22.1.0.0.0",
"product_id": "T028696",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:22.1.0.0.0"
}
}
},
{
"category": "product_version",
"name": "22.2.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 22.2.0.0.0",
"product_id": "T028697",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:22.2.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.7.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.0.0.0",
"product_id": "T028702",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.5.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.5.0.0.0",
"product_id": "T034160",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.6.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.6.0.0.0",
"product_id": "T034161",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.6.0.0.0"
}
}
},
{
"category": "product_version",
"name": "3.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 3.0.0.0.0",
"product_id": "T034165",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:3.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.4.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.4.0.0.0",
"product_id": "T036215",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.4.0.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.2.7",
"product": {
"name": "Oracle Financial Services Applications 8.1.2.7",
"product_id": "T036217",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.7"
}
}
},
{
"category": "product_version",
"name": "14.7.4.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.4.0.0",
"product_id": "T038391",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.4.0.0"
}
}
},
{
"category": "product_version",
"name": "8.1.2.8",
"product": {
"name": "Oracle Financial Services Applications 8.1.2.8",
"product_id": "T038392",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.8"
}
}
},
{
"category": "product_version",
"name": "14.7.5.0.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.5.0.0",
"product_id": "T038393",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.5.0.0"
}
}
},
{
"category": "product_version",
"name": "14.5.0.12.0",
"product": {
"name": "Oracle Financial Services Applications 14.5.0.12.0",
"product_id": "T038394",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.5.0.12.0"
}
}
},
{
"category": "product_version",
"name": "5.0.0.0.0",
"product": {
"name": "Oracle Financial Services Applications 5.0.0.0.0",
"product_id": "T038395",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:5.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "14.7.0.6.0",
"product": {
"name": "Oracle Financial Services Applications 14.7.0.6.0",
"product_id": "T038396",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.6.0"
}
}
}
],
"category": "product_name",
"name": "Financial Services Applications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-31160",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2022-31160"
},
{
"cve": "CVE-2023-34055",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-34055"
},
{
"cve": "CVE-2023-50447",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2023-50447"
},
{
"cve": "CVE-2024-0232",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-21281",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21281"
},
{
"cve": "CVE-2024-21284",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21284"
},
{
"cve": "CVE-2024-21285",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21285"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-2511",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-29025",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-32007",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32007"
},
{
"cve": "CVE-2024-32114",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-32114"
},
{
"cve": "CVE-2024-43407",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-43407"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028694",
"T036217",
"T034165",
"T036215",
"T023933",
"T038393",
"T038394",
"T038395",
"T038396",
"T034161",
"T034160",
"T038391",
"T038392",
"T028702",
"T028697",
"T028695",
"T028696"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
WID-SEC-W-2024-3412
Vulnerability from csaf_certbund
Published
2024-11-12 23:00
Modified
2024-11-12 23:00
Summary
Microsoft Defender for Endpoint: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Microsoft Defender ist eine Software zur Erkennung von schädlicher Software (Malware).
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Defender for Endpoint ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Android
- iPhoneOS
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft Defender ist eine Software zur Erkennung von sch\u00e4dlicher Software (Malware).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Microsoft Defender for Endpoint ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android\n- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3412 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3412.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3412 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3412"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
}
],
"source_lang": "en-US",
"title": "Microsoft Defender for Endpoint: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2024-11-12T23:00:00.000+00:00",
"generator": {
"date": "2024-11-13T09:16:23.519+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3412",
"initial_release_date": "2024-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for Endpoint for Android",
"product": {
"name": "Microsoft Defender for Endpoint for Android",
"product_id": "T022265",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:defender:for_endpoint_for_android"
}
}
},
{
"category": "product_version",
"name": "for Endpoint for iOS",
"product": {
"name": "Microsoft Defender for Endpoint for iOS",
"product_id": "T039030",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:defender:for_endpoint_for_ios"
}
}
}
],
"category": "product_name",
"name": "Defender"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Microsoft Defender for Endpoint f\u00fcr Android und f\u00fcr iOS. Ursache ist ein Puffer\u00fcberlauf in der Funktion SSL_select_next_proto der verwendeten OpenSSL Komponente. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, indem er einen speziell gestalteten Link oder eine E-Mail an den Benutzer sendet, um beliebigen Code auszuf\u00fchren. Je nach genutztem Angriffsvektor kann eine Nutzeraktion erforderlich sein oder nicht."
}
],
"product_status": {
"known_affected": [
"T039030",
"T022265"
]
},
"release_date": "2024-11-12T23:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
WID-SEC-W-2024-3188
Vulnerability from csaf_certbund
Published
2024-10-15 22:00
Modified
2024-11-12 23:00
Summary
Oracle MySQL: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
MySQL ist ein Open Source Datenbankserver von Oracle.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3188 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3188 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7102-1 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7102-1"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-12T23:00:00.000+00:00",
"generator": {
"date": "2024-11-13T09:16:37.317+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3188",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T034126",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "T036237",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21193",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T034126",
"T000126",
"T027843",
"T036237"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7264"
}
]
}
wid-sec-w-2024-1469
Vulnerability from csaf_certbund
Published
2024-06-26 22:00
Modified
2025-08-04 22:00
Summary
OpenSSL: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenSSL ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuführen und Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1469 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1469.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1469 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1469"
},
{
"category": "external",
"summary": "OpenSSL Security Advisory vom 2024-06-26",
"url": "https://www.openssl.org/news/secadv/20240627.txt"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2591 vom 2024-07-23",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2635-1 vom 2024-07-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EAYPMV3WQ7VYZOAFKQ3QLIE6JSVJEI32/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7162032 vom 2024-07-31",
"url": "https://www.ibm.com/support/pages/node/7162032"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6937-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6937-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2761-1 vom 2024-08-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2891-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2604 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2604.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2621 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2621.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2909-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2927-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2931-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2933-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2953-1 vom 2024-08-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2989-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2991-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3019-1 vom 2024-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROZGZZCD7XE2EPPAZ2CXAEPDXGEWCU5O/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3019-1 vom 2024-08-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ROZGZZCD7XE2EPPAZ2CXAEPDXGEWCU5O/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3119-1 vom 2024-09-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019346.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-7D5C1BCC78 vom 2024-09-12",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7d5c1bcc78"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASOPENSSL-SNAPSAFE-2024-006 vom 2024-09-18",
"url": "https://alas.aws.amazon.com/AL2/ALASOPENSSL-SNAPSAFE-2024-006.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7848 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7848"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7846 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7846"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7847 vom 2024-10-09",
"url": "https://access.redhat.com/errata/RHSA-2024:7847"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7848 vom 2024-10-10",
"url": "https://linux.oracle.com/errata/ELSA-2024-7848.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173018 vom 2024-10-14",
"url": "https://www.ibm.com/support/pages/node/7173018"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12786 vom 2024-10-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-12786.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3942 vom 2024-10-31",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9333 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9333"
},
{
"category": "external",
"summary": "Insyde Security Advisory INSYDE-SA-2024012 vom 2024-11-12",
"url": "https://www.insyde.com/security-pledge/SA-2024012"
},
{
"category": "external",
"summary": "HPE Security Bulletin vom 2024-11-14",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04744en_us\u0026docLocale=en_US"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
"url": "https://www.ibm.com/support/pages/node/7178065"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-150 vom 2024-12-17",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-150/index.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10990 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2024:10990"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2025-107 vom 2025-01-29",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-107/index.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182192 vom 2025-01-31",
"url": "https://www.ibm.com/support/pages/node/7182192"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2744 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2744.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2743 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2743.html"
},
{
"category": "external",
"summary": "SolarWinds Platform 2025.1 release notes vom 2025-02-11",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183572 vom 2025-02-18",
"url": "https://www.ibm.com/support/pages/node/7183572"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2025-9176CC66C2 vom 2025-02-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2025-9176cc66c2"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182395 vom 2025-03-04",
"url": "https://www.ibm.com/support/pages/node/7182395"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185261 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185261"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7184919 vom 2025-03-28",
"url": "https://www.ibm.com/support/pages/node/7184919"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3452 vom 2025-04-03",
"url": "https://access.redhat.com/errata/RHSA-2025:3452"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3453 vom 2025-04-02",
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3666 vom 2025-04-08",
"url": "https://access.redhat.com/errata/RHSA-2025:3666"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-020 vom 2025-04-10",
"url": "https://www.dell.com/support/kbdoc/000250484"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
"url": "https://www.ibm.com/support/pages/node/7230557"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-011 vom 2025-05-23",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-011-for-Xerox-FreeFlow-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-010 vom 2025-05-23",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-010-for-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20014-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-255 vom 2025-06-24",
"url": "https://www.dell.com/support/kbdoc/000335103"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "Security Update for Dell PowerProtect Data Domain",
"url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service und Offenlegung von Informationen",
"tracking": {
"current_release_date": "2025-08-04T22:00:00.000+00:00",
"generator": {
"date": "2025-08-05T07:20:05.280+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1469",
"initial_release_date": "2024-06-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-27T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-10-22T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Insyde aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "45"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T035626",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
},
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T036868",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "T40",
"product": {
"name": "Dell PowerEdge T40",
"product_id": "T027537",
"product_identification_helper": {
"cpe": "cpe:/h:dell:poweredge:t40"
}
}
}
],
"category": "product_name",
"name": "PowerEdge"
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain",
"product": {
"name": "Dell PowerProtect Data Domain",
"product_id": "T045852",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain Management Center",
"product": {
"name": "Dell PowerProtect Data Domain Management Center",
"product_id": "T045853",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
}
}
},
{
"category": "product_name",
"name": "Dell PowerProtect Data Domain OS",
"product": {
"name": "Dell PowerProtect Data Domain OS",
"product_id": "T045854",
"product_identification_helper": {
"cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "OpenSSL Software \u003cA.03.00.15.001",
"product": {
"name": "HPE HP-UX OpenSSL Software \u003cA.03.00.15.001",
"product_id": "T039192"
}
},
{
"category": "product_version",
"name": "OpenSSL Software A.03.00.15.001",
"product": {
"name": "HPE HP-UX OpenSSL Software A.03.00.15.001",
"product_id": "T039192-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hp:hp-ux:openssl_software__a.03.00.15.001"
}
}
}
],
"category": "product_name",
"name": "HP-UX"
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T038840",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.3-00",
"product": {
"name": "Hitachi Ops Center \u003c11.0.3-00",
"product_id": "T039867"
}
},
{
"category": "product_version",
"name": "11.0.3-00",
"product": {
"name": "Hitachi Ops Center 11.0.3-00",
"product_id": "T039867-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:11.0.3-00"
}
}
}
],
"category": "product_name",
"name": "Ops Center"
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "Certified Container",
"product": {
"name": "IBM App Connect Enterprise Certified Container",
"product_id": "T037907",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
}
],
"category": "product_name",
"name": "InfoSphere Information Server"
},
{
"category": "product_name",
"name": "IBM MQ",
"product": {
"name": "IBM MQ",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "v10",
"product": {
"name": "IBM Power Hardware Management Console v10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.0.27",
"product": {
"name": "IBM Rational Build Forge \u003c8.0.0.27",
"product_id": "T038286"
}
},
{
"category": "product_version",
"name": "8.0.0.27",
"product": {
"name": "IBM Rational Build Forge 8.0.0.27",
"product_id": "T038286-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.27"
}
}
}
],
"category": "product_name",
"name": "Rational Build Forge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.1.0.8",
"product": {
"name": "IBM Rational ClearCase \u003c9.1.0.8",
"product_id": "T041577"
}
},
{
"category": "product_version",
"name": "9.1.0.8",
"product": {
"name": "IBM Rational ClearCase 9.1.0.8",
"product_id": "T041577-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:9.1.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.0.1.3",
"product": {
"name": "IBM Rational ClearCase \u003c10.0.1.3",
"product_id": "T041578"
}
},
{
"category": "product_version",
"name": "10.0.1.3",
"product": {
"name": "IBM Rational ClearCase 10.0.1.3",
"product_id": "T041578-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:10.0.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.0.3",
"product": {
"name": "IBM Rational ClearCase \u003c11.0.0.3",
"product_id": "T041579"
}
},
{
"category": "product_version",
"name": "11.0.0.3",
"product": {
"name": "IBM Rational ClearCase 11.0.0.3",
"product_id": "T041579-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearcase:11.0.0.3"
}
}
}
],
"category": "product_name",
"name": "Rational ClearCase"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.7",
"product": {
"name": "IBM Rational ClearQuest \u003c10.0.7",
"product_id": "T041698"
}
},
{
"category": "product_version",
"name": "10.0.7",
"product": {
"name": "IBM Rational ClearQuest 10.0.7",
"product_id": "T041698-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearquest:10.0.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003cFix Pack 8 (9.1.0.8) for 9.1",
"product": {
"name": "IBM Rational ClearQuest \u003cFix Pack 8 (9.1.0.8) for 9.1",
"product_id": "T041699"
}
},
{
"category": "product_version",
"name": "Fix Pack 8 (9.1.0.8) for 9.1",
"product": {
"name": "IBM Rational ClearQuest Fix Pack 8 (9.1.0.8) for 9.1",
"product_id": "T041699-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:rational_clearquest:fix_pack_8_%289.1.0.8%29_for_9.1"
}
}
}
],
"category": "product_name",
"name": "Rational ClearQuest"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17",
"product_id": "T042730"
}
},
{
"category": "product_version",
"name": "10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17",
"product_id": "T042730-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cRV24.06.3",
"product": {
"name": "Insyde UEFI Firmware \u003cRV24.06.3",
"product_id": "T038993"
}
},
{
"category": "product_version",
"name": "RV24.06.3",
"product": {
"name": "Insyde UEFI Firmware RV24.06.3",
"product_id": "T038993-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv24.06.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003cRV23.08.1",
"product": {
"name": "Insyde UEFI Firmware \u003cRV23.08.1",
"product_id": "T038994"
}
},
{
"category": "product_version",
"name": "RV23.08.1",
"product": {
"name": "Insyde UEFI Firmware RV23.08.1",
"product_id": "T038994-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:insyde:uefi:rv23.08.1"
}
}
}
],
"category": "product_name",
"name": "UEFI Firmware"
}
],
"category": "vendor",
"name": "Insyde"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.3.2",
"product": {
"name": "Open Source OpenSSL \u003c3.3.2",
"product_id": "T035672"
}
},
{
"category": "product_version",
"name": "3.3.2",
"product": {
"name": "Open Source OpenSSL 3.3.2",
"product_id": "T035672-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.3.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.2.3",
"product": {
"name": "Open Source OpenSSL \u003c3.2.3",
"product_id": "T035673"
}
},
{
"category": "product_version",
"name": "3.2.3",
"product": {
"name": "Open Source OpenSSL 3.2.3",
"product_id": "T035673-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.1.7",
"product": {
"name": "Open Source OpenSSL \u003c3.1.7",
"product_id": "T035674"
}
},
{
"category": "product_version",
"name": "3.1.7",
"product": {
"name": "Open Source OpenSSL 3.1.7",
"product_id": "T035674-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.1.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.0.15",
"product": {
"name": "Open Source OpenSSL \u003c3.0.15",
"product_id": "T035675"
}
},
{
"category": "product_version",
"name": "3.0.15",
"product": {
"name": "Open Source OpenSSL 3.0.15",
"product_id": "T035675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:3.0.15"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.1.1za",
"product": {
"name": "Open Source OpenSSL \u003c1.1.1za",
"product_id": "T035676"
}
},
{
"category": "product_version",
"name": "1.1.1za",
"product": {
"name": "Open Source OpenSSL 1.1.1za",
"product_id": "T035676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:1.1.1za"
}
}
},
{
"category": "product_version_range",
"name": "\u003c1.0.2zk",
"product": {
"name": "Open Source OpenSSL \u003c1.0.2zk",
"product_id": "T035677"
}
},
{
"category": "product_version",
"name": "1.0.2zk",
"product": {
"name": "Open Source OpenSSL 1.0.2zk",
"product_id": "T035677-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openssl:openssl:1.0.2zk"
}
}
}
],
"category": "product_name",
"name": "OpenSSL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.62",
"product": {
"name": "Red Hat JBoss Core Services \u003c2.4.62",
"product_id": "T042316"
}
},
{
"category": "product_version",
"name": "2.4.62",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62",
"product_id": "T042316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:2.4.62"
}
}
}
],
"category": "product_name",
"name": "JBoss Core Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Logging \u003c5.9.10",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.9.10",
"product_id": "T040352"
}
},
{
"category": "product_version",
"name": "Logging 5.9.10",
"product": {
"name": "Red Hat OpenShift Logging 5.9.10",
"product_id": "T040352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.9.10"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.1",
"product": {
"name": "SolarWinds Platform \u003c2025.1",
"product_id": "T040952"
}
},
{
"category": "product_version",
"name": "2025.1",
"product": {
"name": "SolarWinds Platform 2025.1",
"product_id": "T040952-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:orion_platform:2025.1"
}
}
}
],
"category": "product_name",
"name": "Platform"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Xerox FreeFlow Print Server 7",
"product_id": "T000872",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:7"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T035677",
"67646",
"T036868",
"T035672",
"T002977",
"T036688",
"T004914",
"T035676",
"T035675",
"T038741",
"T038840",
"T035674",
"T035673",
"1139691",
"T042730",
"T038286",
"T039192",
"T027537",
"T031092",
"T042316",
"T000872",
"T040952",
"398363",
"T037907",
"T023373",
"T040352",
"434967",
"T035626",
"1039165",
"1522854",
"T039867",
"74185",
"T038994",
"T038993",
"T045853",
"T044962",
"T045852",
"T044961",
"T045854",
"2951",
"T002207",
"T000126",
"444803",
"T041579",
"T041578",
"T041699",
"T041577",
"T041698"
]
},
"release_date": "2024-06-26T22:00:00.000+00:00",
"title": "CVE-2024-5535"
}
]
}
ncsc-2025-0124
Vulnerability from csaf_ncscnl
Published
2025-04-16 08:39
Modified
2025-04-16 08:39
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.
Interpretaties
De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die variëren van 4.3 tot 9.8, wat wijst op significante risico's voor de beschikbaarheid en vertrouwelijkheid van de systemen.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-44
Path Equivalence: 'file.name' (Internal Dot)
CWE-706
Use of Incorrectly-Resolved Name or Reference
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-502
Deserialization of Untrusted Data
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-121
Stack-based Buffer Overflow
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-653
Improper Isolation or Compartmentalization
CWE-670
Always-Incorrect Control Flow Implementation
CWE-676
Use of Potentially Dangerous Function
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
CWE-392
Missing Report of Error Condition
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-208
Observable Timing Discrepancy
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-834
Excessive Iteration
CWE-303
Incorrect Implementation of Authentication Algorithm
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
CWE-1286
Improper Validation of Syntactic Correctness of Input
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-680
Integer Overflow to Buffer Overflow
CWE-345
Insufficient Verification of Data Authenticity
CWE-369
Divide By Zero
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-404
Improper Resource Shutdown or Release
CWE-862
Missing Authorization
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-295
Improper Certificate Validation
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-674
Uncontrolled Recursion
CWE-611
Improper Restriction of XML External Entity Reference
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "general",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-04-16T08:39:55.217751Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0124",
"initial_release_date": "2025-04-16T08:39:55.217751Z",
"revision_history": [
{
"date": "2025-04-16T08:39:55.217751Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838578"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838586"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1838591"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838592"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-1838572"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.1",
"product": {
"name": "vers:unknown/24.2.1",
"product_id": "CSAFPID-1838581"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.2.2",
"product": {
"name": "vers:unknown/24.2.2",
"product_id": "CSAFPID-1838584"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:unknown/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698355"
}
}
],
"category": "product_name",
"name": "Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-2698333"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.0",
"product": {
"name": "vers:unknown/24.2.0",
"product_id": "CSAFPID-2698334"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.5",
"product": {
"name": "vers:unknown/24.2.5",
"product_id": "CSAFPID-2698374"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.0.0",
"product": {
"name": "vers:unknown/9.0.0",
"product_id": "CSAFPID-1234193"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.1",
"product": {
"name": "vers:unknown/9.0.1",
"product_id": "CSAFPID-1234261"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.2",
"product": {
"name": "vers:unknown/9.0.2",
"product_id": "CSAFPID-2698362"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.0.3",
"product": {
"name": "vers:unknown/9.0.3",
"product_id": "CSAFPID-2698358"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698372"
}
}
],
"category": "product_name",
"name": "Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/15.0.0.0.0",
"product": {
"name": "vers:unknown/15.0.0.0.0",
"product_id": "CSAFPID-1837923"
}
}
],
"category": "product_name",
"name": "Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2698373"
}
}
],
"category": "product_name",
"name": "Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/9.1.1.9",
"product": {
"name": "vers:unknown/9.1.1.9",
"product_id": "CSAFPID-2698357"
}
}
],
"category": "product_name",
"name": "SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/24.2.3",
"product": {
"name": "vers:unknown/24.2.3",
"product_id": "CSAFPID-1838579"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/24.3.0",
"product": {
"name": "vers:unknown/24.3.0",
"product_id": "CSAFPID-1838582"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/10.0.0",
"product": {
"name": "vers:unknown/10.0.0",
"product_id": "CSAFPID-2698381"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.2.0",
"product": {
"name": "vers:unknown/9.2.0",
"product_id": "CSAFPID-1207518"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/9.3.0",
"product": {
"name": "vers:unknown/9.3.0",
"product_id": "CSAFPID-1207704"
}
}
],
"category": "product_name",
"name": "Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4.1.0",
"product": {
"name": "vers:unknown/4.1.0",
"product_id": "CSAFPID-1207607"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.2.0",
"product": {
"name": "vers:unknown/4.2.0",
"product_id": "CSAFPID-1207752"
}
}
],
"category": "product_name",
"name": "Enterprise Communications Broker"
}
],
"category": "product_family",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-2698963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.4",
"product": {
"name": "vers:oracle/24.2.4",
"product_id": "CSAFPID-2699085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
"product_id": "CSAFPID-1839907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
"product_id": "CSAFPID-2698965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product": {
"name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
"product_id": "CSAFPID-2698944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-2699059",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1839924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1839909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2698958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-2699086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2699073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/46.6",
"product": {
"name": "vers:oracle/46.6",
"product_id": "CSAFPID-2698993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/5.1",
"product": {
"name": "vers:oracle/5.1",
"product_id": "CSAFPID-1839893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/5.2",
"product": {
"name": "vers:oracle/5.2",
"product_id": "CSAFPID-1839895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.11",
"product": {
"name": "vers:oracle/12.11",
"product_id": "CSAFPID-1839890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0",
"product": {
"name": "vers:oracle/14.0",
"product_id": "CSAFPID-1839891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/14.0.0",
"product": {
"name": "vers:oracle/14.0.0",
"product_id": "CSAFPID-2699072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0",
"product": {
"name": "vers:oracle/15.0",
"product_id": "CSAFPID-1839961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0",
"product": {
"name": "vers:oracle/15.0.0",
"product_id": "CSAFPID-2699023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1",
"product": {
"name": "vers:oracle/15.0.1",
"product_id": "CSAFPID-2699025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.2",
"product": {
"name": "vers:oracle/15.0.2",
"product_id": "CSAFPID-2699024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications User Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0.0",
"product": {
"name": "vers:oracle/9.0.0.0",
"product_id": "CSAFPID-2698999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2698996",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-2699007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Data Analytics Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1839868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.5",
"product": {
"name": "vers:oracle/24.2.5",
"product_id": "CSAFPID-2699029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699098",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Element Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-1839960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Policy Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.0.0",
"product": {
"name": "vers:oracle/9.0.0",
"product_id": "CSAFPID-2699093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.1",
"product": {
"name": "vers:oracle/9.0.1",
"product_id": "CSAFPID-2699092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.2",
"product": {
"name": "vers:oracle/9.0.2",
"product_id": "CSAFPID-2699091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.0.3",
"product": {
"name": "vers:oracle/9.0.3",
"product_id": "CSAFPID-2699090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product": {
"name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
"product_id": "CSAFPID-2699124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Report Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/9.1.1.9",
"product": {
"name": "vers:oracle/9.1.1.9",
"product_id": "CSAFPID-2698959",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle SD-WAN Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/22.4.0",
"product": {
"name": "vers:oracle/22.4.0",
"product_id": "CSAFPID-2699181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1839930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.1",
"product": {
"name": "vers:oracle/24.1.1",
"product_id": "CSAFPID-1839933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.2",
"product": {
"name": "vers:oracle/24.2.2",
"product_id": "CSAFPID-1839931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.3",
"product": {
"name": "vers:oracle/24.2.3",
"product_id": "CSAFPID-1839963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-1839932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/25.1.100",
"product": {
"name": "vers:oracle/25.1.100",
"product_id": "CSAFPID-2698956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product": {
"name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
"product_id": "CSAFPID-2699180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/10.0.0",
"product": {
"name": "vers:oracle/10.0.0",
"product_id": "CSAFPID-2699083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.2.0",
"product": {
"name": "vers:oracle/9.2.0",
"product_id": "CSAFPID-1839887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/9.3.0",
"product": {
"name": "vers:oracle/9.3.0",
"product_id": "CSAFPID-1839889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/4.1.0",
"product": {
"name": "vers:oracle/4.1.0",
"product_id": "CSAFPID-1839888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/4.2.0",
"product": {
"name": "vers:oracle/4.2.0",
"product_id": "CSAFPID-1839886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1839925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1840027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.3.0",
"product": {
"name": "vers:oracle/24.3.0",
"product_id": "CSAFPID-2699041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product": {
"name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
"product_id": "CSAFPID-2698961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
}
],
"category": "product_family",
"name": "Oracle Communications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
"product_id": "CSAFPID-1145869"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
"product_id": "CSAFPID-1145271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
"product_id": "CSAFPID-1173947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
"product_id": "CSAFPID-1145868"
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
"product_id": "CSAFPID-1145270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product": {
"name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
"product_id": "CSAFPID-1173946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.3",
"product": {
"name": "vers:oracle/23.4.3",
"product_id": "CSAFPID-1173942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.4",
"product": {
"name": "vers:oracle/23.4.4",
"product_id": "CSAFPID-1173965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.1",
"product": {
"name": "vers:oracle/24.2.1",
"product_id": "CSAFPID-1173967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.2",
"product": {
"name": "vers:oracle/23.4.2",
"product_id": "CSAFPID-1173943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1173944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145273",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.2.0",
"product": {
"name": "vers:oracle/24.2.0",
"product_id": "CSAFPID-1174046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.3.6",
"product": {
"name": "vers:oracle/7.3.6",
"product_id": "CSAFPID-2699077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-2699075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.0",
"product": {
"name": "vers:oracle/6.0",
"product_id": "CSAFPID-2699027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
"product_id": "CSAFPID-1839852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product": {
"name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
"product_id": "CSAFPID-1840033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product": {
"name": "vers:oracle/\u003e=6.0|\u003c=6.1",
"product_id": "CSAFPID-2698955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.0.8.0",
"product": {
"name": "vers:oracle/12.0.0.8.0",
"product_id": "CSAFPID-2699001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699058",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
"product_id": "CSAFPID-1839957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
"product_id": "CSAFPID-2699000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product": {
"name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
"product_id": "CSAFPID-1839953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.26.0",
"product": {
"name": "vers:oracle/8.1.0.26.0",
"product_id": "CSAFPID-2698964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/6.3.1",
"product": {
"name": "vers:oracle/6.3.1",
"product_id": "CSAFPID-2698991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications MetaSolv Solution"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/12.0.6.0.0",
"product": {
"name": "vers:oracle/12.0.6.0.0",
"product_id": "CSAFPID-2699127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.0",
"product": {
"name": "vers:oracle/7.4.0",
"product_id": "CSAFPID-1839980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-1840004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/15.0.0.0.0",
"product": {
"name": "vers:oracle/15.0.0.0.0",
"product_id": "CSAFPID-2699056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/15.0.1.0.0",
"product": {
"name": "vers:oracle/15.0.1.0.0",
"product_id": "CSAFPID-2699063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product": {
"name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
"product_id": "CSAFPID-2699060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.3",
"product": {
"name": "vers:oracle/8.0.0.3",
"product_id": "CSAFPID-1839921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.0.0.4.0",
"product": {
"name": "vers:oracle/8.0.0.4.0",
"product_id": "CSAFPID-2698975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.1",
"product": {
"name": "vers:oracle/8.1.0.1",
"product_id": "CSAFPID-1839922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/8.1.0.2.0",
"product": {
"name": "vers:oracle/8.1.0.2.0",
"product_id": "CSAFPID-2698974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/7.4.1",
"product": {
"name": "vers:oracle/7.4.1",
"product_id": "CSAFPID-1839978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.4.2",
"product": {
"name": "vers:oracle/7.4.2",
"product_id": "CSAFPID-1839979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.0",
"product": {
"name": "vers:oracle/7.5.0",
"product_id": "CSAFPID-2699035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.5.1",
"product": {
"name": "vers:oracle/7.5.1",
"product_id": "CSAFPID-1839983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.6.0",
"product": {
"name": "vers:oracle/7.6.0",
"product_id": "CSAFPID-1840005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/7.7.0",
"product": {
"name": "vers:oracle/7.7.0",
"product_id": "CSAFPID-2699034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product": {
"name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
"product_id": "CSAFPID-2699036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product": {
"name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
"product_id": "CSAFPID-2699096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
}
],
"category": "product_family",
"name": "Oracle Communications Applications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:oracle/23.4.0",
"product": {
"name": "vers:oracle/23.4.0",
"product_id": "CSAFPID-1145246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version_range",
"name": "vers:oracle/24.1.0",
"product": {
"name": "vers:oracle/24.1.0",
"product_id": "CSAFPID-1145247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:semver/7.4.0",
"product": {
"name": "vers:semver/7.4.0",
"product_id": "CSAFPID-2698653"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.4.1",
"product": {
"name": "vers:semver/7.4.1",
"product_id": "CSAFPID-2698654"
}
},
{
"category": "product_version_range",
"name": "vers:semver/7.5.0",
"product": {
"name": "vers:semver/7.5.0",
"product_id": "CSAFPID-2698655"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
}
],
"category": "vendor",
"name": "Oracle Corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-5388",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5388",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5388"
},
{
"cve": "CVE-2023-5685",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5685",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-5685"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51074",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2023-51074"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4227",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-4227"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6763",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6763",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
}
],
"title": "CVE-2024-6763"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-11053",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-11053",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-11053"
},
{
"cve": "CVE-2024-12797",
"cwe": {
"id": "CWE-392",
"name": "Missing Report of Error Condition"
},
"notes": [
{
"category": "other",
"text": "Missing Report of Error Condition",
"title": "CWE-392"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12797",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12797"
},
{
"cve": "CVE-2024-12798",
"cwe": {
"id": "CWE-917",
"name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
"title": "CWE-917"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12798",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-12798"
},
{
"cve": "CVE-2024-21538",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21538",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-28168",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28168",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28168"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-31141",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31141",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-31141"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-40896",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-40896"
},
{
"cve": "CVE-2024-43044",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43044",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43044"
},
{
"cve": "CVE-2024-43709",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json"
}
],
"title": "CVE-2024-43709"
},
{
"cve": "CVE-2024-43796",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-43796"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-52046",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52046"
},
{
"cve": "CVE-2024-52303",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-52303",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-52303"
},
{
"cve": "CVE-2024-53122",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53122",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-53122"
},
{
"cve": "CVE-2024-56128",
"cwe": {
"id": "CWE-303",
"name": "Incorrect Implementation of Authentication Algorithm"
},
"notes": [
{
"category": "other",
"text": "Incorrect Implementation of Authentication Algorithm",
"title": "CWE-303"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56128",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56128"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1974",
"cwe": {
"id": "CWE-653",
"name": "Improper Isolation or Compartmentalization"
},
"notes": [
{
"category": "other",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-1974"
},
{
"cve": "CVE-2025-23084",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23084",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-23084"
},
{
"cve": "CVE-2025-23184",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23184",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
}
],
"title": "CVE-2025-23184"
},
{
"cve": "CVE-2025-24813",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
"title": "CWE-44"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24928",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24928",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24928"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24970",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-24970"
},
{
"cve": "CVE-2025-27516",
"cwe": {
"id": "CWE-1336",
"name": "Improper Neutralization of Special Elements Used in a Template Engine"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements Used in a Template Engine",
"title": "CWE-1336"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json"
}
],
"title": "CVE-2025-27516"
},
{
"cve": "CVE-2025-27789",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-27789"
},
{
"cve": "CVE-2025-30729",
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30729",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-30729"
},
{
"cve": "CVE-2025-31721",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31721",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1838578",
"CSAFPID-1839911",
"CSAFPID-1839908",
"CSAFPID-1145869",
"CSAFPID-1145271",
"CSAFPID-1173947",
"CSAFPID-2698963",
"CSAFPID-2698973",
"CSAFPID-2699085",
"CSAFPID-1839941",
"CSAFPID-1838591",
"CSAFPID-1145868",
"CSAFPID-1145270",
"CSAFPID-1173946",
"CSAFPID-1839907",
"CSAFPID-2698965",
"CSAFPID-2698944",
"CSAFPID-1173942",
"CSAFPID-1173945",
"CSAFPID-1839952",
"CSAFPID-2699038",
"CSAFPID-1838592",
"CSAFPID-1173940",
"CSAFPID-1173941",
"CSAFPID-1839951",
"CSAFPID-2699059",
"CSAFPID-1173965",
"CSAFPID-1173967",
"CSAFPID-1839919",
"CSAFPID-2698957",
"CSAFPID-1838572",
"CSAFPID-1838581",
"CSAFPID-1838584",
"CSAFPID-1839924",
"CSAFPID-1173943",
"CSAFPID-1173944",
"CSAFPID-1839910",
"CSAFPID-1839909",
"CSAFPID-1839894",
"CSAFPID-2698958",
"CSAFPID-2699094",
"CSAFPID-1145265",
"CSAFPID-1145273",
"CSAFPID-1174046",
"CSAFPID-1839934",
"CSAFPID-2699086",
"CSAFPID-1839935",
"CSAFPID-2699073",
"CSAFPID-2698993",
"CSAFPID-1839893",
"CSAFPID-1839895",
"CSAFPID-1839890",
"CSAFPID-1839891",
"CSAFPID-2699072",
"CSAFPID-1839961",
"CSAFPID-2699023",
"CSAFPID-2699025",
"CSAFPID-2699024",
"CSAFPID-2698999",
"CSAFPID-2699077",
"CSAFPID-2699075",
"CSAFPID-2699076",
"CSAFPID-2698355",
"CSAFPID-2699027",
"CSAFPID-1839852",
"CSAFPID-1840033",
"CSAFPID-2698955",
"CSAFPID-2699001",
"CSAFPID-2699084",
"CSAFPID-2699079",
"CSAFPID-2699058",
"CSAFPID-1839957",
"CSAFPID-2699000",
"CSAFPID-1839953",
"CSAFPID-2698964",
"CSAFPID-2698991",
"CSAFPID-2699127",
"CSAFPID-2699126",
"CSAFPID-2699128",
"CSAFPID-1839980",
"CSAFPID-1840004",
"CSAFPID-1839981",
"CSAFPID-2698653",
"CSAFPID-2698654",
"CSAFPID-2698655",
"CSAFPID-2699056",
"CSAFPID-2699063",
"CSAFPID-2699060",
"CSAFPID-1839921",
"CSAFPID-2698975",
"CSAFPID-1839922",
"CSAFPID-2698974",
"CSAFPID-1839978",
"CSAFPID-1839979",
"CSAFPID-2699035",
"CSAFPID-1839983",
"CSAFPID-1840005",
"CSAFPID-2699034",
"CSAFPID-2699036",
"CSAFPID-2699096",
"CSAFPID-2698996",
"CSAFPID-2698333",
"CSAFPID-2698334",
"CSAFPID-2699007",
"CSAFPID-2698374",
"CSAFPID-1145246",
"CSAFPID-1145247",
"CSAFPID-1839868",
"CSAFPID-2699029",
"CSAFPID-1839869",
"CSAFPID-1234193",
"CSAFPID-1234261",
"CSAFPID-2698362",
"CSAFPID-2698358",
"CSAFPID-2698372",
"CSAFPID-2699013",
"CSAFPID-2699012",
"CSAFPID-2699016",
"CSAFPID-2699015",
"CSAFPID-2699098",
"CSAFPID-1837923",
"CSAFPID-1839960",
"CSAFPID-2698373",
"CSAFPID-2699093",
"CSAFPID-2699092",
"CSAFPID-2699091",
"CSAFPID-2699090",
"CSAFPID-2699124",
"CSAFPID-2698959",
"CSAFPID-2698357",
"CSAFPID-1838579",
"CSAFPID-1838582",
"CSAFPID-2699181",
"CSAFPID-1839930",
"CSAFPID-1839933",
"CSAFPID-1839931",
"CSAFPID-1839963",
"CSAFPID-1839932",
"CSAFPID-2698956",
"CSAFPID-2699180",
"CSAFPID-2698381",
"CSAFPID-1207518",
"CSAFPID-1207704",
"CSAFPID-2699083",
"CSAFPID-1839887",
"CSAFPID-1839889",
"CSAFPID-1207607",
"CSAFPID-1207752",
"CSAFPID-1839888",
"CSAFPID-1839886",
"CSAFPID-1839925",
"CSAFPID-1840027",
"CSAFPID-2699041",
"CSAFPID-2698961",
"CSAFPID-1838586"
]
}
],
"title": "CVE-2025-31721"
}
]
}
ncsc-2025-0027
Vulnerability from csaf_ncscnl
Published
2025-01-22 13:36
Modified
2025-01-22 13:36
Summary
Kwetsbaarheden verholpen in Oracle Fusion Middleware
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft meerdere kwetsbaarheden verholpen in zijn producten, waaronder Oracle Fusion Middleware, Oracle WebLogic Server, en Oracle HTTP Server.
Interpretaties
De kwetsbaarheden bevinden zich in verschillende Oracle producten, waaronder Oracle WebLogic Server versies 12.2.1.4.0 en 14.1.1.0.0, die het mogelijk maken voor ongeauthenticeerde kwaadwillenden om toegang te krijgen tot kritieke gegevens. Dit kan leiden tot ernstige gevolgen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen. De kwetsbaarheid in Oracle HTTP Server versie 12.2.1.4.0 stelt kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, met een CVSS-score van 5.3, terwijl de kwetsbaarheid in WebLogic Server een CVSS-score van 9.8 heeft, wat wijst op een kritieke impact. Kwaadwillenden kunnen ook gebruik maken van kwetsbaarheden in Oracle Fusion Middleware en andere producten om Denial-of-Service (DoS) aanvallen uit te voeren.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE-35
Path Traversal: '.../...//'
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-755
Improper Handling of Exceptional Conditions
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-116
Improper Encoding or Escaping of Output
CWE-190
Integer Overflow or Wraparound
CWE-532
Insertion of Sensitive Information into Log File
CWE-798
Use of Hard-coded Credentials
CWE-125
Out-of-bounds Read
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-295
Improper Certificate Validation
CWE-400
Uncontrolled Resource Consumption
CWE-502
Deserialization of Untrusted Data
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-611
Improper Restriction of XML External Entity Reference
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-20
Improper Input Validation
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn producten, waaronder Oracle Fusion Middleware, Oracle WebLogic Server, en Oracle HTTP Server.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden bevinden zich in verschillende Oracle producten, waaronder Oracle WebLogic Server versies 12.2.1.4.0 en 14.1.1.0.0, die het mogelijk maken voor ongeauthenticeerde kwaadwillenden om toegang te krijgen tot kritieke gegevens. Dit kan leiden tot ernstige gevolgen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen. De kwetsbaarheid in Oracle HTTP Server versie 12.2.1.4.0 stelt kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, met een CVSS-score van 5.3, terwijl de kwetsbaarheid in WebLogic Server een CVSS-score van 9.8 heeft, wat wijst op een kritieke impact. Kwaadwillenden kunnen ook gebruik maken van kwetsbaarheden in Oracle Fusion Middleware en andere producten om Denial-of-Service (DoS) aanvallen uit te voeren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware",
"tracking": {
"current_release_date": "2025-01-22T13:36:27.908718Z",
"id": "NCSC-2025-0027",
"initial_release_date": "2025-01-22T13:36:27.908718Z",
"revision_history": [
{
"date": "2025-01-22T13:36:27.908718Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-93909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-40303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "http_server",
"product": {
"name": "http_server",
"product_id": "CSAFPID-912074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:http_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware_mapviewer",
"product": {
"name": "fusion_middleware_mapviewer",
"product_id": "CSAFPID-226018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1646487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-332789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1747074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.19.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-342815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-271904",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-503474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fusion_middleware",
"product": {
"name": "fusion_middleware",
"product_id": "CSAFPID-1674670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fusion_middleware:8.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-3661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-3660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-1973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "weblogic_server",
"product": {
"name": "weblogic_server",
"product_id": "CSAFPID-1751293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_service",
"product": {
"name": "security_service",
"product_id": "CSAFPID-199820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:security_service:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring",
"product": {
"name": "business_activity_monitoring",
"product_id": "CSAFPID-228157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring__bam_",
"product": {
"name": "business_activity_monitoring__bam_",
"product_id": "CSAFPID-764927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_activity_monitoring__bam_",
"product": {
"name": "business_activity_monitoring__bam_",
"product_id": "CSAFPID-764928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_activity_monitoring__bam_:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "identity_manager",
"product": {
"name": "identity_manager",
"product_id": "CSAFPID-220164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:identity_manager:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "managed_file_transfer",
"product": {
"name": "managed_file_transfer",
"product_id": "CSAFPID-204581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "middleware_common_libraries_and_tools",
"product": {
"name": "middleware_common_libraries_and_tools",
"product_id": "CSAFPID-94393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:middleware_common_libraries_and_tools:14.1.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_process_management_suite",
"product": {
"name": "business_process_management_suite",
"product_id": "CSAFPID-9043",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_process_management_suite",
"product": {
"name": "business_process_management_suite",
"product_id": "CSAFPID-9642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outside_in_technology",
"product": {
"name": "outside_in_technology",
"product_id": "CSAFPID-1260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outside_in_technology",
"product": {
"name": "outside_in_technology",
"product_id": "CSAFPID-912053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "webcenter_portal",
"product": {
"name": "webcenter_portal",
"product_id": "CSAFPID-135359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "webcenter_portal",
"product": {
"name": "webcenter_portal",
"product_id": "CSAFPID-45194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-12415",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-45194",
"CSAFPID-135359",
"CSAFPID-1646487",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-204581",
"CSAFPID-94309",
"CSAFPID-1260",
"CSAFPID-3661",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-764927",
"CSAFPID-764928",
"CSAFPID-9043",
"CSAFPID-93909",
"CSAFPID-94398"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-12415",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-12415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-45194",
"CSAFPID-135359",
"CSAFPID-1646487",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-204581",
"CSAFPID-94309",
"CSAFPID-1260",
"CSAFPID-3661",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-764927",
"CSAFPID-764928",
"CSAFPID-9043",
"CSAFPID-93909",
"CSAFPID-94398"
]
}
],
"title": "CVE-2019-12415"
},
{
"cve": "CVE-2023-7272",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44483",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44483.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-9642",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-271904",
"CSAFPID-94393",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157"
]
}
],
"title": "CVE-2023-44483"
},
{
"cve": "CVE-2023-49582",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2023-49582"
},
{
"cve": "CVE-2023-51775",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
}
],
"title": "CVE-2023-51775"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-8096",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8096",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8096.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-8096"
},
{
"cve": "CVE-2024-23635",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23635",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23635.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1260",
"CSAFPID-1973",
"CSAFPID-3660",
"CSAFPID-40303",
"CSAFPID-45194",
"CSAFPID-94309",
"CSAFPID-94393",
"CSAFPID-204581",
"CSAFPID-220164",
"CSAFPID-226018",
"CSAFPID-912053",
"CSAFPID-912074",
"CSAFPID-228157",
"CSAFPID-271904"
]
}
],
"title": "CVE-2024-23635"
},
{
"cve": "CVE-2024-29857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-1747074",
"CSAFPID-1674670",
"CSAFPID-503474"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29857",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973",
"CSAFPID-1747074",
"CSAFPID-1674670",
"CSAFPID-503474"
]
}
],
"title": "CVE-2024-29857"
},
{
"cve": "CVE-2024-30171",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-30171"
},
{
"cve": "CVE-2024-30172",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30172",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30172.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-30172"
},
{
"cve": "CVE-2024-34447",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"notes": [
{
"category": "other",
"text": "Use of Incorrectly-Resolved Name or Reference",
"title": "CWE-706"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34447",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-271904",
"CSAFPID-40303",
"CSAFPID-220164",
"CSAFPID-94309",
"CSAFPID-912053",
"CSAFPID-45194",
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2024-34447"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-204581"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-204581"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-199820"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-199820"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-199820"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-199820"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94309",
"CSAFPID-220164"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-94309",
"CSAFPID-220164"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94309",
"CSAFPID-220164"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-94309",
"CSAFPID-220164"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157",
"CSAFPID-9642",
"CSAFPID-226018",
"CSAFPID-45194"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157",
"CSAFPID-9642",
"CSAFPID-226018",
"CSAFPID-45194"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9642",
"CSAFPID-228157",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-226018",
"CSAFPID-45194"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9642",
"CSAFPID-228157",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-226018",
"CSAFPID-45194"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912053",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912053",
"CSAFPID-332789",
"CSAFPID-342815",
"CSAFPID-271904",
"CSAFPID-1674670",
"CSAFPID-503474",
"CSAFPID-40303"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47072",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-228157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-228157"
]
}
],
"title": "CVE-2024-47072"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751293",
"CSAFPID-45194",
"CSAFPID-1973",
"CSAFPID-3660"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751293",
"CSAFPID-45194",
"CSAFPID-1973",
"CSAFPID-3660"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9642"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9642"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2025-21498",
"product_status": {
"known_affected": [
"CSAFPID-40303"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21498",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21498.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-40303"
]
}
],
"title": "CVE-2025-21498"
},
{
"cve": "CVE-2025-21535",
"product_status": {
"known_affected": [
"CSAFPID-3660",
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-3660",
"CSAFPID-1973"
]
}
],
"title": "CVE-2025-21535"
},
{
"cve": "CVE-2025-21549",
"product_status": {
"known_affected": [
"CSAFPID-1973"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1973"
]
}
],
"title": "CVE-2025-21549"
}
]
}
ncsc-2024-0433
Vulnerability from csaf_ncscnl
Published
2024-11-12 14:19
Modified
2024-11-12 14:19
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Cross-Site-Scripting (XSS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-606
Unchecked Input for Loop Condition
CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE-115
Misinterpretation of Input
CWE-1059
Insufficient Technical Documentation
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-310
CWE-310
CWE-328
Use of Weak Hash
CWE-1284
Improper Validation of Specified Quantity in Input
CWE-213
Exposure of Sensitive Information Due to Incompatible Policies
CWE-1268
Policy Privileges are not Assigned Consistently Between Control and Data Agents
CWE-684
Incorrect Provision of Specified Functionality
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-208
Observable Timing Discrepancy
CWE-201
Insertion of Sensitive Information Into Sent Data
CWE-834
Excessive Iteration
CWE-266
Incorrect Privilege Assignment
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-271
Privilege Dropping / Lowering Errors
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-667
Improper Locking
CWE-440
Expected Behavior Violation
CWE-297
Improper Validation of Certificate with Host Mismatch
CWE-311
Missing Encryption of Sensitive Data
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-617
Reachable Assertion
CWE-427
Uncontrolled Search Path Element
CWE-319
Cleartext Transmission of Sensitive Information
CWE-613
Insufficient Session Expiration
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-203
Observable Discrepancy
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-190
Integer Overflow or Wraparound
CWE-321
Use of Hard-coded Cryptographic Key
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-416
Use After Free
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-757
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-436
Interpretation Conflict
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-863
Incorrect Authorization
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-789
Memory Allocation with Excessive Size Value
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-287
Improper Authentication
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "general",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Interpretation Conflict",
"title": "CWE-436"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-11-12T14:19:20.051128Z",
"id": "NCSC-2024-0433",
"initial_release_date": "2024-11-12T14:19:20.051128Z",
"revision_history": [
{
"date": "2024-11-12T14:19:20.051128Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix_runtime_v10.12",
"product": {
"name": "mendix_runtime_v10.12",
"product_id": "CSAFPID-1637623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10.6",
"product": {
"name": "mendix_runtime_v10.6",
"product_id": "CSAFPID-1637624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10",
"product": {
"name": "mendix_runtime_v10",
"product_id": "CSAFPID-1637622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v8",
"product": {
"name": "mendix_runtime_v8",
"product_id": "CSAFPID-1637625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v9",
"product": {
"name": "mendix_runtime_v9",
"product_id": "CSAFPID-1637626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw672",
"product": {
"name": "ozw672",
"product_id": "CSAFPID-1712832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw772",
"product": {
"name": "ozw772",
"product_id": "CSAFPID-1712833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product_id": "CSAFPID-1712834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product_id": "CSAFPID-1712835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product_id": "CSAFPID-1712836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product_id": "CSAFPID-1712837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product_id": "CSAFPID-1712838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-1615259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1702670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1702671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1637909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1470060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7_port_configuration_tool",
"product": {
"name": "s7_port_configuration_tool",
"product_id": "CSAFPID-1472074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1702672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1712749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1712750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1702677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1702678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1702679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn_",
"product": {
"name": "scalance_m874-3_3g-router__cn_",
"product_id": "CSAFPID-1712751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1712752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1702681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1712753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1702682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1702683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1_",
"product": {
"name": "scalance_mum853-1__a1_",
"product_id": "CSAFPID-1712754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1_",
"product": {
"name": "scalance_mum853-1__b1_",
"product_id": "CSAFPID-1712755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1712756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1_",
"product": {
"name": "scalance_mum856-1__a1_",
"product_id": "CSAFPID-1712757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1_",
"product": {
"name": "scalance_mum856-1__b1_",
"product_id": "CSAFPID-1712758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn_",
"product": {
"name": "scalance_mum856-1__cn_",
"product_id": "CSAFPID-1712759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1702684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1702685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1712760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1712761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product": {
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product_id": "CSAFPID-1613504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product": {
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product_id": "CSAFPID-1613505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product": {
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product_id": "CSAFPID-1613506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product": {
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product_id": "CSAFPID-1613507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product": {
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product_id": "CSAFPID-1613592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product_id": "CSAFPID-1613593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product_id": "CSAFPID-1613594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product_id": "CSAFPID-1613595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product_id": "CSAFPID-1613596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product_id": "CSAFPID-1613597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product_id": "CSAFPID-1613598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-1625339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1637910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1470061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1472069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1637559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1470062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1625340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1470063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1543-1_v4.0",
"product": {
"name": "simatic_cp_1543-1_v4.0",
"product_id": "CSAFPID-1712748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_family",
"product": {
"name": "simatic_mv500_family",
"product_id": "CSAFPID-1703073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc-software",
"product": {
"name": "simatic_net_pc-software",
"product_id": "CSAFPID-1625344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1470064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1637849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1457906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1637850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1457907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1637851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1457908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs",
"product": {
"name": "simatic_pcs",
"product_id": "CSAFPID-838530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1501190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1457909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1637912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1470065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_",
"product": {
"name": "simatic_route_control_",
"product_id": "CSAFPID-1625337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1637856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1470066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager",
"product": {
"name": "simatic_rtls_locating_manager",
"product_id": "CSAFPID-1691398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product_id": "CSAFPID-1703180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product_id": "CSAFPID-1703181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product_id": "CSAFPID-1703182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product_id": "CSAFPID-1703183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product_id": "CSAFPID-1703184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product_id": "CSAFPID-1703185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product_id": "CSAFPID-1703186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product_id": "CSAFPID-1703131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v16",
"product": {
"name": "simatic_s7-plcsim_v16",
"product_id": "CSAFPID-1712825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v17",
"product": {
"name": "simatic_s7-plcsim_v17",
"product_id": "CSAFPID-1712826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v16",
"product": {
"name": "simatic_step_7_safety_v16",
"product_id": "CSAFPID-1703190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v17",
"product": {
"name": "simatic_step_7_safety_v17",
"product_id": "CSAFPID-1703191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v18",
"product": {
"name": "simatic_step_7_safety_v18",
"product_id": "CSAFPID-1500667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v16",
"product": {
"name": "simatic_step_7_v16",
"product_id": "CSAFPID-1703187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v17",
"product": {
"name": "simatic_step_7_v17",
"product_id": "CSAFPID-1703188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v18",
"product": {
"name": "simatic_step_7_v18",
"product_id": "CSAFPID-1703189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1637913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1457855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-75563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1550826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1637914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1457956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1637915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1457957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1637916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1457958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-766087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-1470067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1637917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1457960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1637887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1457961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1501188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1457962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1501192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1457963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-744621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-1470068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v16",
"product": {
"name": "simatic_wincc_unified_v16",
"product_id": "CSAFPID-1703192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v17",
"product": {
"name": "simatic_wincc_unified_v17",
"product_id": "CSAFPID-1703193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v18",
"product": {
"name": "simatic_wincc_unified_v18",
"product_id": "CSAFPID-1703194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v16",
"product": {
"name": "simatic_wincc_v16",
"product_id": "CSAFPID-1702687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v17",
"product": {
"name": "simatic_wincc_v17",
"product_id": "CSAFPID-1702688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v18",
"product": {
"name": "simatic_wincc_v18",
"product_id": "CSAFPID-1703195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1501193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1457965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1501191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1457966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1501189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1457967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v16",
"product": {
"name": "simocode_es_v16",
"product_id": "CSAFPID-1702694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v17",
"product": {
"name": "simocode_es_v17",
"product_id": "CSAFPID-1703196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v18",
"product": {
"name": "simocode_es_v18",
"product_id": "CSAFPID-1703197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp1",
"product": {
"name": "simotion_scout_tia_v5.4_sp1",
"product_id": "CSAFPID-1703198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp3",
"product": {
"name": "simotion_scout_tia_v5.4_sp3",
"product_id": "CSAFPID-1703199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.5_sp1",
"product": {
"name": "simotion_scout_tia_v5.5_sp1",
"product_id": "CSAFPID-1703200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1625341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1470069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v16",
"product": {
"name": "sinamics_startdrive_v16",
"product_id": "CSAFPID-1703201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v17",
"product": {
"name": "sinamics_startdrive_v17",
"product_id": "CSAFPID-1703202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v18",
"product": {
"name": "sinamics_startdrive_v18",
"product_id": "CSAFPID-1703203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-746925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_network_management_system",
"product": {
"name": "sinec_network_management_system",
"product_id": "CSAFPID-1691397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-309392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1458012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1693062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1691473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinema_remote_connect_client",
"product": {
"name": "sinema_remote_connect_client",
"product_id": "CSAFPID-894438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1625342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1470070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1625338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1470071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siport",
"product": {
"name": "siport",
"product_id": "CSAFPID-1712847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v17",
"product": {
"name": "sirius_safety_es_v17",
"product_id": "CSAFPID-1703204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v18",
"product": {
"name": "sirius_safety_es_v18",
"product_id": "CSAFPID-1703205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v17",
"product": {
"name": "sirius_soft_starter_es_v17",
"product_id": "CSAFPID-1703206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v18",
"product": {
"name": "sirius_soft_starter_es_v18",
"product_id": "CSAFPID-1703207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1680248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spectrum_power_7",
"product": {
"name": "spectrum_power_7",
"product_id": "CSAFPID-524281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect",
"product": {
"name": "st7_scadaconnect",
"product_id": "CSAFPID-1691077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product": {
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product_id": "CSAFPID-1703173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic",
"product": {
"name": "telecontrol_server_basic",
"product_id": "CSAFPID-1691051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_1000_v3.1",
"product": {
"name": "telecontrol_server_basic_1000_v3.1",
"product_id": "CSAFPID-1712839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_256_v3.1",
"product": {
"name": "telecontrol_server_basic_256_v3.1",
"product_id": "CSAFPID-1712840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_32_v3.1",
"product": {
"name": "telecontrol_server_basic_32_v3.1",
"product_id": "CSAFPID-1712841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_5000_v3.1",
"product": {
"name": "telecontrol_server_basic_5000_v3.1",
"product_id": "CSAFPID-1712842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_64_v3.1",
"product": {
"name": "telecontrol_server_basic_64_v3.1",
"product_id": "CSAFPID-1712843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_8_v3.1",
"product": {
"name": "telecontrol_server_basic_8_v3.1",
"product_id": "CSAFPID-1712844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_serv_upgr",
"product": {
"name": "telecontrol_server_basic_serv_upgr",
"product_id": "CSAFPID-1712845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_upgr_v3.1",
"product": {
"name": "telecontrol_server_basic_upgr_v3.1",
"product_id": "CSAFPID-1712846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_v3",
"product": {
"name": "telecontrol_server_basic_v3",
"product_id": "CSAFPID-1637855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1625345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1470072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v16",
"product": {
"name": "tia_portal_cloud_v16",
"product_id": "CSAFPID-1712827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v17",
"product": {
"name": "tia_portal_cloud_v17",
"product_id": "CSAFPID-1712828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v18",
"product": {
"name": "tia_portal_cloud_v18",
"product_id": "CSAFPID-1712829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-75533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-1472073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1615531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1458014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1615256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1458015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1615257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1458016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1615258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1458017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1637618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1470073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc",
"product": {
"name": "wincc",
"product_id": "CSAFPID-1625343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc_tia_portal",
"product": {
"name": "wincc_tia_portal",
"product_id": "CSAFPID-465667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500",
"product": {
"name": "simatic_s7-1500",
"product_id": "CSAFPID-715650",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7",
"product": {
"name": "simatic_s7",
"product_id": "CSAFPID-1613729",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1691401",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-715649",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-880853",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808_firmware",
"product": {
"name": "ruggedcom_ape1808_firmware",
"product_id": "CSAFPID-542833",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-540747",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7-1500_tm_mfp",
"product_id": "CSAFPID-1693048",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product_id": "CSAFPID-907212",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_telecontrol_server_basic",
"product": {
"name": "siemens_telecontrol_server_basic",
"product_id": "CSAFPID-907211",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_firmware",
"product": {
"name": "simatic_mv500_firmware",
"product_id": "CSAFPID-1692274",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1472070",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7",
"product": {
"name": "simatic_pcs_7",
"product_id": "CSAFPID-1472067",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1689769",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-766929",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-717239",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-905869",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7",
"product": {
"name": "simatic_step_7",
"product_id": "CSAFPID-879652",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472068",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472066",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472072",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa",
"product": {
"name": "simatic_wincc_oa",
"product_id": "CSAFPID-1472071",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-886176",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165976",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165974",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855582",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855580",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3506",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3341",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3341",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
}
],
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4236",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
}
],
"title": "CVE-2023-4236"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5517",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
}
],
"title": "CVE-2023-5517"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-309392",
"CSAFPID-1703173",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5679",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5679",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
}
],
"title": "CVE-2023-5679"
},
{
"cve": "CVE-2023-5680",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5680",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
}
],
"title": "CVE-2023-5680"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6516",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
}
],
"title": "CVE-2023-6516"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-30584",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30584",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32002",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32003",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
}
],
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32005",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
}
],
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32558",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32736",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
}
],
"title": "CVE-2023-32736"
},
{
"cve": "CVE-2023-38552",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
}
],
"title": "CVE-2023-38552"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39331",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
}
],
"title": "CVE-2023-39331"
},
{
"cve": "CVE-2023-39332",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39332",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
}
],
"title": "CVE-2023-39332"
},
{
"cve": "CVE-2023-39333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39333",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
}
],
"title": "CVE-2023-39333"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45143",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
}
],
"title": "CVE-2023-45143"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46280",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
}
],
"title": "CVE-2023-46280"
},
{
"cve": "CVE-2023-46809",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
}
],
"title": "CVE-2023-46809"
},
{
"cve": "CVE-2023-47038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
}
],
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-47039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47039",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
}
],
"title": "CVE-2023-47039"
},
{
"cve": "CVE-2023-47100",
"references": [
{
"category": "self",
"summary": "CVE-2023-47100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
}
],
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49441",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2023-50387",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
}
],
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-52389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52389",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
}
],
"title": "CVE-2023-52389"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Interpretation Conflict",
"title": "CWE-436"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5594",
"references": [
{
"category": "self",
"summary": "CVE-2024-5594",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-21890",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
}
],
"title": "CVE-2024-21890"
},
{
"cve": "CVE-2024-21891",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
}
],
"title": "CVE-2024-21891"
},
{
"cve": "CVE-2024-21892",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
}
],
"title": "CVE-2024-21892"
},
{
"cve": "CVE-2024-21896",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
}
],
"title": "CVE-2024-21896"
},
{
"cve": "CVE-2024-22017",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
}
],
"title": "CVE-2024-22017"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22025",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
}
],
"title": "CVE-2024-22025"
},
{
"cve": "CVE-2024-24758",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Policy with Untrusted Domains"
},
"notes": [
{
"category": "other",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24758",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
}
],
"title": "CVE-2024-24758"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-24806",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24806",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
}
],
"title": "CVE-2024-24806"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-310",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26306",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26925",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
}
],
"title": "CVE-2024-27980"
},
{
"cve": "CVE-2024-27982",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27982",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
}
],
"title": "CVE-2024-27982"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-28882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-29119",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"product_status": {
"known_affected": [
"CSAFPID-524281"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-524281"
]
}
],
"title": "CVE-2024-29119"
},
{
"cve": "CVE-2024-36140",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
}
],
"title": "CVE-2024-36140"
},
{
"cve": "CVE-2024-44102",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-44102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
}
],
"title": "CVE-2024-44102"
},
{
"cve": "CVE-2024-46888",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46888"
},
{
"cve": "CVE-2024-46889",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46889",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46889"
},
{
"cve": "CVE-2024-46890",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46890"
},
{
"cve": "CVE-2024-46891",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46891"
},
{
"cve": "CVE-2024-46892",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46892"
},
{
"cve": "CVE-2024-46894",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46894",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46894"
},
{
"cve": "CVE-2024-47783",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712847"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47783",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1712847"
]
}
],
"title": "CVE-2024-47783"
},
{
"cve": "CVE-2024-47808",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2024-47808"
},
{
"cve": "CVE-2024-47940",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47940",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47940"
},
{
"cve": "CVE-2024-47941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47941",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47941"
},
{
"cve": "CVE-2024-47942",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47942",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47942"
},
{
"cve": "CVE-2024-50310",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712748"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50310",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712748"
]
}
],
"title": "CVE-2024-50310"
},
{
"cve": "CVE-2024-50313",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50313",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
}
],
"title": "CVE-2024-50313"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50560",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50572"
}
]
}
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Published
2025-01-22 13:30
Modified
2025-01-22 13:30
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.
Interpretaties
De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-670
Always-Incorrect Control Flow Implementation
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-35
Path Traversal: '.../...//'
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CWE-676
Use of Potentially Dangerous Function
CWE-606
Unchecked Input for Loop Condition
CWE-450
Multiple Interpretations of UI Input
CWE-131
Incorrect Calculation of Buffer Size
CWE-328
Use of Weak Hash
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-1220
Insufficient Granularity of Access Control
CWE-201
Insertion of Sensitive Information Into Sent Data
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-347
Improper Verification of Cryptographic Signature
CWE-834
Excessive Iteration
CWE-178
Improper Handling of Case Sensitivity
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-440
Expected Behavior Violation
CWE-415
Double Free
CWE-311
Missing Encryption of Sensitive Data
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-617
Reachable Assertion
CWE-427
Uncontrolled Search Path Element
CWE-836
Use of Password Hash Instead of Password for Authentication
CWE-680
Integer Overflow to Buffer Overflow
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-23
Relative Path Traversal
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-203
Observable Discrepancy
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-190
Integer Overflow or Wraparound
CWE-451
User Interface (UI) Misrepresentation of Critical Information
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-798
Use of Hard-coded Credentials
CWE-434
Unrestricted Upload of File with Dangerous Type
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-863
Incorrect Authorization
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-611
Improper Restriction of XML External Entity Reference
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-209
Generation of Error Message Containing Sensitive Information
CWE-276
Incorrect Default Permissions
CWE-294
Authentication Bypass by Capture-replay
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:15
Modified
2024-10-17 13:15
Summary
Kwetsbaarheden verholpen in Oracle Database producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van data
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-208
Observable Timing Discrepancy
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-178
Improper Handling of Case Sensitivity
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-415
Double Free
CWE-311
Missing Encryption of Sensitive Data
CWE-427
Uncontrolled Search Path Element
CWE-172
Encoding Error
CWE-680
Integer Overflow to Buffer Overflow
CWE-426
Untrusted Search Path
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-668
Exposure of Resource to Wrong Sphere
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-681
Incorrect Conversion between Numeric Types
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-18
CWE-18
CWE-385
Covert Timing Channel
CWE-606
Unchecked Input for Loop Condition
CWE-192
Integer Coercion Error
CWE-390
Detection of Error Condition Without Action
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-131
Incorrect Calculation of Buffer Size
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-304
Missing Critical Step in Authentication
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
ncsc-2025-0028
Vulnerability from csaf_ncscnl
Published
2025-01-22 13:36
Modified
2025-01-22 13:36
Summary
Kwetsbaarheden verholpen in Oracle Analytics
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in Oracle Analytics producten, zoals Business Intelligence, Analytics Desktop en BI Publisher.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of zich toegang te verschaffen tot gevoelige gegevens.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-611
Improper Restriction of XML External Entity Reference
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-789
Memory Allocation with Excessive Size Value
CWE-20
Improper Input Validation
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-670
Always-Incorrect Control Flow Implementation
CWE-399
CWE-399
CWE-326
Inadequate Encryption Strength
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CWE-834
Excessive Iteration
CWE-311
Missing Encryption of Sensitive Data
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Analytics producten, zoals Business Intelligence, Analytics Desktop en BI Publisher.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of zich toegang te verschaffen tot gevoelige gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Analytics",
"tracking": {
"current_release_date": "2025-01-22T13:36:58.196605Z",
"id": "NCSC-2025-0028",
"initial_release_date": "2025-01-22T13:36:58.196605Z",
"revision_history": [
{
"date": "2025-01-22T13:36:58.196605Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-220360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:enterprise:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-135810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-257324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1650736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_service_administration_ui___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_storage_service_integration___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-228391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-1673195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1650735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_7.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_8.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10000",
"references": [
{
"category": "self",
"summary": "CVE-2016-10000",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2016/CVE-2016-10000.json"
}
],
"title": "CVE-2016-10000"
},
{
"cve": "CVE-2020-2849",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-2849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-2849.json"
}
],
"title": "CVE-2020-2849"
},
{
"cve": "CVE-2020-7760",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-7760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-7760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-7760"
},
{
"cve": "CVE-2020-13956",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13956",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13956.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-28975",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-28975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-28975"
},
{
"cve": "CVE-2021-23926",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-23926",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
}
],
"title": "CVE-2021-23926"
},
{
"cve": "CVE-2021-33813",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
}
],
"title": "CVE-2021-33813"
},
{
"cve": "CVE-2022-40150",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40150",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40150.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4785",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4785.json"
}
],
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-7272",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2023-24998",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-399",
"title": "CWE-399"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json"
}
],
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-25399",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-25399",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-25399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-25399"
},
{
"cve": "CVE-2023-29824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-29824"
},
{
"cve": "CVE-2023-32732",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32732",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-33202",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33202",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33202.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33202"
},
{
"cve": "CVE-2023-33953",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-50782",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-50782",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50782.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-36114",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36114",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-43382",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43382",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43382.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-43382"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2025-21532",
"product_status": {
"known_affected": [
"CSAFPID-1751157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21532",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21532.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751157"
]
}
],
"title": "CVE-2025-21532"
}
]
}
ncsc-2025-0106
Vulnerability from csaf_ncscnl
Published
2025-04-08 13:57
Modified
2025-04-08 13:57
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (root/admin rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
- Spoofing
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Dreigingsinformatie
Kans
medium
Schade
high
CWE-287
Improper Authentication
CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE-606
Unchecked Input for Loop Condition
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-363
Race Condition Enabling Link Following
CWE-420
Unprotected Alternate Channel
CWE-684
Incorrect Provision of Specified Functionality
CWE-834
Excessive Iteration
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE-440
Expected Behavior Violation
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-319
Cleartext Transmission of Sensitive Information
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
CWE-1390
Weak Authentication
CWE-204
Observable Response Discrepancy
CWE-15
External Control of System or Configuration Setting
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-653
Improper Isolation or Compartmentalization
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-620
Unverified Password Change
CWE-798
Use of Hard-coded Credentials
CWE-269
Improper Privilege Management
CWE-295
Improper Certificate Validation
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Industrial Edge Devices, Mendix, SENTRON, SIDIS, SIMATIC, SIPLUS,Insights Hub Private Cloud, Siemens License Server en Solid Edge.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n- Spoofing\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "description",
"text": " ",
"title": "Dreigingsinformatie"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Race Condition Enabling Link Following",
"title": "CWE-363"
},
{
"category": "general",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Unverified Password Change",
"title": "CWE-620"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-187636.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-277137.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-525431.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-634640.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672923.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-725549.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-819629.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874353.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-817234.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-04-08T13:57:11.959816Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0106",
"initial_release_date": "2025-04-08T13:57:11.959816Z",
"revision_history": [
{
"date": "2025-04-08T13:57:11.959816Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1-a",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1-a",
"product_id": "CSAFPID-2631845"
}
}
],
"category": "product_name",
"name": "Industrial Edge Own Device (IEOD)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1",
"product_id": "CSAFPID-2631844"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.20.2-1",
"product": {
"name": "vers:unknown/\u003cv1.20.2-1",
"product_id": "CSAFPID-2631843"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631842"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631841"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631840"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - x86-64 V1.17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.21.1-1",
"product": {
"name": "vers:unknown/\u003cv1.21.1-1",
"product_id": "CSAFPID-2631839"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.20.2-1",
"product": {
"name": "vers:unknown/\u003cv1.20.2-1",
"product_id": "CSAFPID-2631838"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631837"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631836"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631835"
}
}
],
"category": "product_name",
"name": "Industrial Edge Device Kit - arm64 V1.17"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631900"
}
}
],
"category": "product_name",
"name": "SENTRON 7KT PAC1260 Data Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4.0",
"product": {
"name": "vers:unknown/4.0",
"product_id": "CSAFPID-2632341"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.1",
"product": {
"name": "vers:unknown/4.1",
"product_id": "CSAFPID-2632342"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.2",
"product": {
"name": "vers:unknown/4.2",
"product_id": "CSAFPID-2632343"
}
}
],
"category": "product_name",
"name": "License Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv4.3",
"product": {
"name": "vers:unknown/\u003cv4.3",
"product_id": "CSAFPID-2631790"
}
}
],
"category": "product_name",
"name": "Siemens License Server (SLS)"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/224.0 update 12",
"product": {
"name": "vers:siemens/224.0 update 12",
"product_id": "CSAFPID-2632460"
}
},
{
"category": "product_version_range",
"name": "vers:siemens/225.0 update 3",
"product": {
"name": "vers:siemens/225.0 update 3",
"product_id": "CSAFPID-2632459"
}
}
],
"category": "product_name",
"name": "Solid Edge"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/v224.0 update 12",
"product": {
"name": "vers:siemens/v224.0 update 12",
"product_id": "CSAFPID-2632083"
}
}
],
"category": "product_name",
"name": "Solid_Edge_Se2024"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:siemens/2.0 sp1",
"product": {
"name": "vers:siemens/2.0 sp1",
"product_id": "CSAFPID-1211926"
}
}
],
"category": "product_name",
"name": "SINEC Network Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/none",
"product": {
"name": "vers:unknown/none",
"product_id": "CSAFPID-2619361"
}
}
],
"category": "product_name",
"name": "Siemens Simatic S7-1500 Tm Mfp"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=3|\u003c312",
"product": {
"name": "vers:unknown/\u003e=3|\u003c312",
"product_id": "CSAFPID-1209122"
}
}
],
"category": "product_name",
"name": "Siemens Telecontrol Server Basic"
}
],
"category": "product_family",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv224.0update12",
"product": {
"name": "vers:unknown/\u003cv224.0update12",
"product_id": "CSAFPID-2631854"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2024"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv225.0update3",
"product": {
"name": "vers:unknown/\u003cv225.0update3",
"product_id": "CSAFPID-2631855"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0.0",
"product": {
"name": "vers:unknown/\u003cv2.0.0",
"product_id": "CSAFPID-1296722"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0",
"product": {
"name": "vers:unknown/\u003cv2.0",
"product_id": "CSAFPID-2631923"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv2.0.0",
"product": {
"name": "vers:unknown/\u003cv2.0.0",
"product_id": "CSAFPID-1296723"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631924"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200AL IM 157-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631925"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200M IM 153-4 PN IO HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631926"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200M IM 153-4 PN IO ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631927"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631928"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631929"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200MP IM 155-5 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631932"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN FO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631933"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631934"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN HS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631935"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-3 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765658"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-8 PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765659"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200S IM 151-8F PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631856"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1510SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631858"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1510SP-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631860"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1512SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631862"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP CPU 1512SP-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765660"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 MF HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631936"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv1.3",
"product": {
"name": "vers:unknown/\u003cv1.3",
"product_id": "CSAFPID-2631937"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631938"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631939"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN HS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631940"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP IM 155-6 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631920"
}
}
],
"category": "product_name",
"name": "SIDOOR ATD430W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631921"
}
}
],
"category": "product_name",
"name": "SIDOOR ATE530G COATED"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631922"
}
}
],
"category": "product_name",
"name": "SIDOOR ATE530S COATED"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631967"
}
}
],
"category": "product_name",
"name": "SIMOCODE pro V Ethernet/IP (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631968"
}
}
],
"category": "product_name",
"name": "SIMOCODE pro V PROFINET"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631969"
}
}
],
"category": "product_name",
"name": "SINUMERIK 840D sl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632004"
}
}
],
"category": "product_name",
"name": "SIWAREX WP231"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632005"
}
}
],
"category": "product_name",
"name": "SIWAREX WP241"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632006"
}
}
],
"category": "product_name",
"name": "SIWAREX WP251"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632007"
}
}
],
"category": "product_name",
"name": "SIWAREX WP521 ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2632008"
}
}
],
"category": "product_name",
"name": "SIWAREX WP522 ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631966"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765690"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765691"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv8.3",
"product": {
"name": "vers:unknown/\u003cv8.3",
"product_id": "CSAFPID-2459039"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631970"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200M IM 153-4 PN IO HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631971"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200M IM 153-4 PN IO ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631972"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631973"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631974"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631975"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765700"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM 151-8 PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1765701"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM 151-8F PN/DP CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631976"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM151-3 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631977"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200S IM151-3 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296980"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CPU 1512SP F-1 PN"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631978"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631979"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631980"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN HF TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631981"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631982"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST BA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631983"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631984"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631985"
}
}
],
"category": "product_name",
"name": "SIPLUS HCS4200 CIM4210"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/10.16.0",
"product": {
"name": "vers:unknown/10.16.0",
"product_id": "CSAFPID-2632402"
}
}
],
"category": "product_name",
"name": "Mendix Runtime"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv10.21.0",
"product": {
"name": "vers:unknown/\u003cv10.21.0",
"product_id": "CSAFPID-2631802"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631803"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.12"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631804"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-2631805"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V10.6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003c*",
"product": {
"name": "vers:unknown/\u003c*",
"product_id": "CSAFPID-1296837"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V8"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003cv9.24.34",
"product": {
"name": "vers:unknown/\u003cv9.24.34",
"product_id": "CSAFPID-2631806"
}
}
],
"category": "product_name",
"name": "Mendix Runtime V9"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21658",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "other",
"text": "Race Condition Enabling Link Following",
"title": "CWE-363"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-21658",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-21658.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2022-21658"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2024-0056",
"cwe": {
"id": "CWE-420",
"name": "Unprotected Alternate Channel"
},
"notes": [
{
"category": "other",
"text": "Unprotected Alternate Channel",
"title": "CWE-420"
},
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0056",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0056.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-0056"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-21319",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21319",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21319.json"
}
],
"title": "CVE-2024-21319"
},
{
"cve": "CVE-2024-23814",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23814",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23814.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-23814"
},
{
"cve": "CVE-2024-30105",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30105",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30105.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-30105"
},
{
"cve": "CVE-2024-41788",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41788.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41788"
},
{
"cve": "CVE-2024-41789",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41789",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41789"
},
{
"cve": "CVE-2024-41790",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41790",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41790"
},
{
"cve": "CVE-2024-41791",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41791"
},
{
"cve": "CVE-2024-41792",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41792",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41792"
},
{
"cve": "CVE-2024-41793",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41793",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41793.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41793"
},
{
"cve": "CVE-2024-41794",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41794",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41794"
},
{
"cve": "CVE-2024-41795",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "other",
"text": "Cross-Site Request Forgery (CSRF)",
"title": "CWE-352"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41795"
},
{
"cve": "CVE-2024-41796",
"cwe": {
"id": "CWE-620",
"name": "Unverified Password Change"
},
"notes": [
{
"category": "other",
"text": "Unverified Password Change",
"title": "CWE-620"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41796",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-41796"
},
{
"cve": "CVE-2024-54091",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54091",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54091.json"
}
],
"title": "CVE-2024-54091"
},
{
"cve": "CVE-2024-54092",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54092",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54092.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2024-54092"
},
{
"cve": "CVE-2025-30280",
"cwe": {
"id": "CWE-204",
"name": "Observable Response Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Response Discrepancy",
"title": "CWE-204"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-30280"
},
{
"cve": "CVE-2025-1097",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1097.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1097"
},
{
"cve": "CVE-2025-24514",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24514",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24514.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-24514"
},
{
"cve": "CVE-2025-24513",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24513",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24513.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-24513"
},
{
"cve": "CVE-2025-1974",
"cwe": {
"id": "CWE-653",
"name": "Improper Isolation or Compartmentalization"
},
"notes": [
{
"category": "other",
"text": "Improper Isolation or Compartmentalization",
"title": "CWE-653"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1974",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1974"
},
{
"cve": "CVE-2025-1098",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "External Control of System or Configuration Setting",
"title": "CWE-15"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1098",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-1098"
},
{
"cve": "CVE-2025-29999",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-29999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29999.json"
}
],
"title": "CVE-2025-29999"
},
{
"cve": "CVE-2025-30000",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30000",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30000.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2631845",
"CSAFPID-2631844",
"CSAFPID-2631843",
"CSAFPID-2631842",
"CSAFPID-2631841",
"CSAFPID-2631840",
"CSAFPID-2631839",
"CSAFPID-2631838",
"CSAFPID-2631837",
"CSAFPID-2631836",
"CSAFPID-2631835",
"CSAFPID-2631900",
"CSAFPID-2632341",
"CSAFPID-2632342",
"CSAFPID-2632343",
"CSAFPID-2631790",
"CSAFPID-2632460",
"CSAFPID-2632459",
"CSAFPID-2631854",
"CSAFPID-2631855",
"CSAFPID-2632083",
"CSAFPID-1296722",
"CSAFPID-2631923",
"CSAFPID-1296723",
"CSAFPID-2631924",
"CSAFPID-2631925",
"CSAFPID-2631926",
"CSAFPID-2631927",
"CSAFPID-2631928",
"CSAFPID-2631929",
"CSAFPID-2631932",
"CSAFPID-2631933",
"CSAFPID-2631934",
"CSAFPID-2631935",
"CSAFPID-1765658",
"CSAFPID-1765659",
"CSAFPID-2631856",
"CSAFPID-2631858",
"CSAFPID-2631860",
"CSAFPID-2631862",
"CSAFPID-1765660",
"CSAFPID-2631936",
"CSAFPID-2631937",
"CSAFPID-2631938",
"CSAFPID-2631939",
"CSAFPID-2631940",
"CSAFPID-2631920",
"CSAFPID-2631921",
"CSAFPID-2631922",
"CSAFPID-2631967",
"CSAFPID-2631968",
"CSAFPID-2631969",
"CSAFPID-2632004",
"CSAFPID-2632005",
"CSAFPID-2632006",
"CSAFPID-2632007",
"CSAFPID-2632008",
"CSAFPID-2631966",
"CSAFPID-1765690",
"CSAFPID-1765691",
"CSAFPID-2459039",
"CSAFPID-2631970",
"CSAFPID-2631971",
"CSAFPID-2631972",
"CSAFPID-2631973",
"CSAFPID-2631974",
"CSAFPID-2631975",
"CSAFPID-1765700",
"CSAFPID-1765701",
"CSAFPID-2631976",
"CSAFPID-2631977",
"CSAFPID-1296980",
"CSAFPID-2631978",
"CSAFPID-2631979",
"CSAFPID-2631980",
"CSAFPID-2631981",
"CSAFPID-2631982",
"CSAFPID-2631983",
"CSAFPID-2631984",
"CSAFPID-2631985",
"CSAFPID-2632402",
"CSAFPID-2631802",
"CSAFPID-2631803",
"CSAFPID-2631804",
"CSAFPID-2631805",
"CSAFPID-1296837",
"CSAFPID-2631806",
"CSAFPID-1211926",
"CSAFPID-2619361",
"CSAFPID-1209122"
]
}
],
"title": "CVE-2025-30000"
}
]
}
ncsc-2025-0023
Vulnerability from csaf_ncscnl
Published
2025-01-22 13:31
Modified
2025-01-22 13:31
Summary
Kwetsbaarheden verholpen in Oracle PeopleSoft
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft meerdere kwetsbaarheden verholpen in Oracle PeopleSoft, specifiek in de versies 8.60, 8.61 en 9.2.
Interpretaties
De kwetsbaarheden in Oracle PeopleSoft stellen geauthenticeerde kwaadwillenden in staat om via HTTP-netwerktoegang ongeautoriseerde toegang te krijgen tot specifieke gegevens, wat kan leiden tot ongeautoriseerde gegevensmanipulatie en -toegang. Kwaadwillenden kunnen ook een Denial-of-Service veroorzaken. Hiervoor heeft de kwaadwillende geen voorafgaande authenticatie nodig.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden in PeopleSoft te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-670
Always-Incorrect Control Flow Implementation
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-125
Out-of-bounds Read
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle PeopleSoft, specifiek in de versies 8.60, 8.61 en 9.2.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle PeopleSoft stellen geauthenticeerde kwaadwillenden in staat om via HTTP-netwerktoegang ongeautoriseerde toegang te krijgen tot specifieke gegevens, wat kan leiden tot ongeautoriseerde gegevensmanipulatie en -toegang. Kwaadwillenden kunnen ook een Denial-of-Service veroorzaken. Hiervoor heeft de kwaadwillende geen voorafgaande authenticatie nodig.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in PeopleSoft te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle PeopleSoft",
"tracking": {
"current_release_date": "2025-01-22T13:31:17.380797Z",
"id": "NCSC-2025-0023",
"initial_release_date": "2025-01-22T13:31:17.380797Z",
"revision_history": [
{
"date": "2025-01-22T13:31:17.380797Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "peoplesoft_enterprise_cc_common_application_objects",
"product": {
"name": "peoplesoft_enterprise_cc_common_application_objects",
"product_id": "CSAFPID-449779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_cc_common_application_objects:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_fin_cash_management",
"product": {
"name": "peoplesoft_enterprise_fin_cash_management",
"product_id": "CSAFPID-765405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_cash_management:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_fin_esettlements",
"product": {
"name": "peoplesoft_enterprise_fin_esettlements",
"product_id": "CSAFPID-1751153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_esettlements:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_hcm_human_resources",
"product": {
"name": "peoplesoft_enterprise_hcm_human_resources",
"product_id": "CSAFPID-172663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_human_resources:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_hcm_shared_components",
"product": {
"name": "peoplesoft_enterprise_hcm_shared_components",
"product_id": "CSAFPID-607590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_shared_components:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-816362",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503669",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_peopletools",
"product": {
"name": "peoplesoft_enterprise_peopletools",
"product_id": "CSAFPID-1503678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "peoplesoft_enterprise_scm_purchasing",
"product": {
"name": "peoplesoft_enterprise_scm_purchasing",
"product_id": "CSAFPID-172660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_scm_purchasing:9.2:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-22218",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-22218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-22218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2020-22218"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1682",
"CSAFPID-1681",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1682",
"CSAFPID-1681",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-1682",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-1682",
"CSAFPID-816362",
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1503676",
"CSAFPID-1503678"
]
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-27280",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2024-27281",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27281",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27281.json"
}
],
"title": "CVE-2024-27281"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27282",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27282.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-27282"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-172663",
"CSAFPID-607590",
"CSAFPID-1503667",
"CSAFPID-1503669",
"CSAFPID-1682",
"CSAFPID-1503672",
"CSAFPID-1503673",
"CSAFPID-1681",
"CSAFPID-1503676",
"CSAFPID-1503678",
"CSAFPID-816362"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-37372",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816362",
"CSAFPID-1681"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816362",
"CSAFPID-1681"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2025-21530",
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21530",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21530.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2025-21530"
},
{
"cve": "CVE-2025-21537",
"product_status": {
"known_affected": [
"CSAFPID-765405"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21537",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21537.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-765405"
]
}
],
"title": "CVE-2025-21537"
},
{
"cve": "CVE-2025-21539",
"product_status": {
"known_affected": [
"CSAFPID-1751153"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21539",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21539.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751153"
]
}
],
"title": "CVE-2025-21539"
},
{
"cve": "CVE-2025-21545",
"product_status": {
"known_affected": [
"CSAFPID-1681",
"CSAFPID-816362"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21545",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21545.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1681",
"CSAFPID-816362"
]
}
],
"title": "CVE-2025-21545"
},
{
"cve": "CVE-2025-21561",
"product_status": {
"known_affected": [
"CSAFPID-172660"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-172660"
]
}
],
"title": "CVE-2025-21561"
},
{
"cve": "CVE-2025-21562",
"product_status": {
"known_affected": [
"CSAFPID-449779"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21562",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21562.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-449779"
]
}
],
"title": "CVE-2025-21562"
},
{
"cve": "CVE-2025-21563",
"product_status": {
"known_affected": [
"CSAFPID-449779"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21563",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21563.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-449779"
]
}
],
"title": "CVE-2025-21563"
}
]
}
NCSC-2024-0411
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:15
Modified
2024-10-17 13:15
Summary
Kwetsbaarheden verholpen in Oracle Database producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van data
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-208
Observable Timing Discrepancy
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-178
Improper Handling of Case Sensitivity
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-415
Double Free
CWE-311
Missing Encryption of Sensitive Data
CWE-427
Uncontrolled Search Path Element
CWE-172
Encoding Error
CWE-680
Integer Overflow to Buffer Overflow
CWE-426
Untrusted Search Path
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-668
Exposure of Resource to Wrong Sphere
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-681
Incorrect Conversion between Numeric Types
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-18
CWE-18
CWE-385
Covert Timing Channel
CWE-606
Unchecked Input for Loop Condition
CWE-192
Integer Coercion Error
CWE-390
Detection of Error Condition Without Action
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-131
Incorrect Calculation of Buffer Size
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-304
Missing Critical Step in Authentication
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
NCSC-2024-0420
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:20
Modified
2024-10-17 13:20
Summary
Kwetsbaarheden verholpen in Oracle MySQL
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in MySQL.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-390
Detection of Error Condition Without Action
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-345
Insufficient Verification of Data Authenticity
CWE-190
Integer Overflow or Wraparound
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-20
Improper Input Validation
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-10-17T13:20:42.437738Z",
"id": "NCSC-2024-0420",
"initial_release_date": "2024-10-17T13:20:42.437738Z",
"revision_history": [
{
"date": "2024-10-17T13:20:42.437738Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1673522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_client",
"product": {
"name": "mysql_client",
"product_id": "CSAFPID-1673440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45853",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-45853"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-21193",
"references": [
{
"category": "self",
"summary": "CVE-2024-21193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json"
}
],
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"references": [
{
"category": "self",
"summary": "CVE-2024-21194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json"
}
],
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21199",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"references": [
{
"category": "self",
"summary": "CVE-2024-21204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json"
}
],
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.0,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"references": [
{
"category": "self",
"summary": "CVE-2024-21262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json"
}
],
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"references": [
{
"category": "self",
"summary": "CVE-2024-21272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json"
}
],
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"title": "CVE-2024-39689"
}
]
}
NCSC-2024-0433
Vulnerability from csaf_ncscnl
Published
2024-11-12 14:19
Modified
2024-11-12 14:19
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Cross-Site-Scripting (XSS)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-606
Unchecked Input for Loop Condition
CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE-115
Misinterpretation of Input
CWE-1059
Insufficient Technical Documentation
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-310
CWE-310
CWE-328
Use of Weak Hash
CWE-1284
Improper Validation of Specified Quantity in Input
CWE-213
Exposure of Sensitive Information Due to Incompatible Policies
CWE-1268
Policy Privileges are not Assigned Consistently Between Control and Data Agents
CWE-684
Incorrect Provision of Specified Functionality
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-208
Observable Timing Discrepancy
CWE-201
Insertion of Sensitive Information Into Sent Data
CWE-834
Excessive Iteration
CWE-266
Incorrect Privilege Assignment
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-271
Privilege Dropping / Lowering Errors
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-667
Improper Locking
CWE-440
Expected Behavior Violation
CWE-297
Improper Validation of Certificate with Host Mismatch
CWE-311
Missing Encryption of Sensitive Data
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-617
Reachable Assertion
CWE-427
Uncontrolled Search Path Element
CWE-319
Cleartext Transmission of Sensitive Information
CWE-613
Insufficient Session Expiration
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-203
Observable Discrepancy
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-190
Integer Overflow or Wraparound
CWE-321
Use of Hard-coded Cryptographic Key
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-416
Use After Free
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-757
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-436
Interpretation Conflict
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-863
Incorrect Authorization
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-789
Memory Allocation with Excessive Size Value
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-287
Improper Authentication
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als Mendix, RUGGEDCOM, SCALANCE, SIMATIC en SINEC.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "general",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "general",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Interpretation Conflict",
"title": "CWE-436"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-000297.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-064257.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-230445.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-331112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-351178.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-354112.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-454789.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616032.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654798.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-871035.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914892.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-915275.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2024-11-12T14:19:20.051128Z",
"id": "NCSC-2024-0433",
"initial_release_date": "2024-11-12T14:19:20.051128Z",
"revision_history": [
{
"date": "2024-11-12T14:19:20.051128Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mendix_runtime_v10.12",
"product": {
"name": "mendix_runtime_v10.12",
"product_id": "CSAFPID-1637623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.12:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10.6",
"product": {
"name": "mendix_runtime_v10.6",
"product_id": "CSAFPID-1637624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v10",
"product": {
"name": "mendix_runtime_v10",
"product_id": "CSAFPID-1637622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v10:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v8",
"product": {
"name": "mendix_runtime_v8",
"product_id": "CSAFPID-1637625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mendix_runtime_v9",
"product": {
"name": "mendix_runtime_v9",
"product_id": "CSAFPID-1637626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:mendix_runtime_v9:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw672",
"product": {
"name": "ozw672",
"product_id": "CSAFPID-1712832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw672:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ozw772",
"product": {
"name": "ozw772",
"product_id": "CSAFPID-1712833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ozw772:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_1000_to_5000_v3.1",
"product_id": "CSAFPID-1712834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_1000_to_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_256_to_1000_v3.1",
"product_id": "CSAFPID-1712835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_256_to_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_32_to_64_v3.1",
"product_id": "CSAFPID-1712836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_32_to_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_64_to_256_v3.1",
"product_id": "CSAFPID-1712837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_64_to_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product": {
"name": "pp_telecontrol_server_basic_8_to_32_v3.1",
"product_id": "CSAFPID-1712838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:pp_telecontrol_server_basic_8_to_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-1615259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1702670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1702671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1637909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7-pct",
"product": {
"name": "s7-pct",
"product_id": "CSAFPID-1470060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7-pct:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "s7_port_configuration_tool",
"product": {
"name": "s7_port_configuration_tool",
"product_id": "CSAFPID-1472074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:s7_port_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1702672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1712749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1712750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1702677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1702678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1702679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn_",
"product": {
"name": "scalance_m874-3_3g-router__cn_",
"product_id": "CSAFPID-1712751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1712752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1702681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1712753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1702682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1702683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1_",
"product": {
"name": "scalance_mum853-1__a1_",
"product_id": "CSAFPID-1712754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1_",
"product": {
"name": "scalance_mum853-1__b1_",
"product_id": "CSAFPID-1712755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1712756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1_",
"product": {
"name": "scalance_mum856-1__a1_",
"product_id": "CSAFPID-1712757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1_",
"product": {
"name": "scalance_mum856-1__b1_",
"product_id": "CSAFPID-1712758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn_",
"product": {
"name": "scalance_mum856-1__cn_",
"product_id": "CSAFPID-1712759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1702684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1702685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1712760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1712761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product": {
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product_id": "CSAFPID-1613504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product": {
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product_id": "CSAFPID-1613505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product": {
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product_id": "CSAFPID-1613506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product": {
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product_id": "CSAFPID-1613507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product": {
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product_id": "CSAFPID-1613592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product_id": "CSAFPID-1613593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product_id": "CSAFPID-1613594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product_id": "CSAFPID-1613595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product_id": "CSAFPID-1613596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product_id": "CSAFPID-1613597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product_id": "CSAFPID-1613598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-1625339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1637910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool__sct_",
"product": {
"name": "security_configuration_tool__sct_",
"product_id": "CSAFPID-1470061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:security_configuration_tool__sct_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1472069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1637559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_automation_tool",
"product": {
"name": "simatic_automation_tool",
"product_id": "CSAFPID-1470062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_automation_tool:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1625340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_batch_v9.1",
"product": {
"name": "simatic_batch_v9.1",
"product_id": "CSAFPID-1470063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_batch_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1543-1_v4.0",
"product": {
"name": "simatic_cp_1543-1_v4.0",
"product_id": "CSAFPID-1712748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1543-1_v4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_family",
"product": {
"name": "simatic_mv500_family",
"product_id": "CSAFPID-1703073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc-software",
"product": {
"name": "simatic_net_pc-software",
"product_id": "CSAFPID-1625344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc-software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1470064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1637849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v16",
"product": {
"name": "simatic_net_pc_software_v16",
"product_id": "CSAFPID-1457906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1637850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v17",
"product": {
"name": "simatic_net_pc_software_v17",
"product_id": "CSAFPID-1457907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1637851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v18",
"product": {
"name": "simatic_net_pc_software_v18",
"product_id": "CSAFPID-1457908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software_v19",
"product": {
"name": "simatic_net_pc_software_v19",
"product_id": "CSAFPID-1637560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_net_pc_software_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs",
"product": {
"name": "simatic_pcs",
"product_id": "CSAFPID-838530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1501190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7_v9.1",
"product": {
"name": "simatic_pcs_7_v9.1",
"product_id": "CSAFPID-1457909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_7_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1637912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1470065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_",
"product": {
"name": "simatic_route_control_",
"product_id": "CSAFPID-1625337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1637856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_route_control_v9.1",
"product": {
"name": "simatic_route_control_v9.1",
"product_id": "CSAFPID-1470066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_route_control_v9.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager",
"product": {
"name": "simatic_rtls_locating_manager",
"product_id": "CSAFPID-1691398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product_id": "CSAFPID-1703180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product_id": "CSAFPID-1703181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product_id": "CSAFPID-1703182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product_id": "CSAFPID-1703183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product_id": "CSAFPID-1703184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product_id": "CSAFPID-1703185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product_id": "CSAFPID-1703186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product_id": "CSAFPID-1703131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v16",
"product": {
"name": "simatic_s7-plcsim_v16",
"product_id": "CSAFPID-1712825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_v17",
"product": {
"name": "simatic_s7-plcsim_v17",
"product_id": "CSAFPID-1712826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v16",
"product": {
"name": "simatic_step_7_safety_v16",
"product_id": "CSAFPID-1703190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v17",
"product": {
"name": "simatic_step_7_safety_v17",
"product_id": "CSAFPID-1703191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_safety_v18",
"product": {
"name": "simatic_step_7_safety_v18",
"product_id": "CSAFPID-1500667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_safety_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v16",
"product": {
"name": "simatic_step_7_v16",
"product_id": "CSAFPID-1703187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v17",
"product": {
"name": "simatic_step_7_v17",
"product_id": "CSAFPID-1703188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v18",
"product": {
"name": "simatic_step_7_v18",
"product_id": "CSAFPID-1703189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1637913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7_v5",
"product": {
"name": "simatic_step_7_v5",
"product_id": "CSAFPID-1457855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_step_7_v5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-75563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1550826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc:8.0:update_5:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1637914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.17",
"product": {
"name": "simatic_wincc_oa_v3.17",
"product_id": "CSAFPID-1457956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1637915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.18",
"product": {
"name": "simatic_wincc_oa_v3.18",
"product_id": "CSAFPID-1457957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1637916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa_v3.19",
"product": {
"name": "simatic_wincc_oa_v3.19",
"product_id": "CSAFPID-1457958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_oa_v3.19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-766087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-1470067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1637917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v16",
"product": {
"name": "simatic_wincc_runtime_professional_v16",
"product_id": "CSAFPID-1457960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1637887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v17",
"product": {
"name": "simatic_wincc_runtime_professional_v17",
"product_id": "CSAFPID-1457961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1501188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v18",
"product": {
"name": "simatic_wincc_runtime_professional_v18",
"product_id": "CSAFPID-1457962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1501192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional_v19",
"product": {
"name": "simatic_wincc_runtime_professional_v19",
"product_id": "CSAFPID-1457963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional_v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-744621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime",
"product": {
"name": "simatic_wincc_unified_pc_runtime",
"product_id": "CSAFPID-1470068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_pc_runtime_v18",
"product": {
"name": "simatic_wincc_unified_pc_runtime_v18",
"product_id": "CSAFPID-1637561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_pc_runtime_v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v16",
"product": {
"name": "simatic_wincc_unified_v16",
"product_id": "CSAFPID-1703192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v17",
"product": {
"name": "simatic_wincc_unified_v17",
"product_id": "CSAFPID-1703193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_unified_v18",
"product": {
"name": "simatic_wincc_unified_v18",
"product_id": "CSAFPID-1703194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_unified_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v16",
"product": {
"name": "simatic_wincc_v16",
"product_id": "CSAFPID-1702687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v17",
"product": {
"name": "simatic_wincc_v17",
"product_id": "CSAFPID-1702688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v18",
"product": {
"name": "simatic_wincc_v18",
"product_id": "CSAFPID-1703195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1501193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.4",
"product": {
"name": "simatic_wincc_v7.4",
"product_id": "CSAFPID-1457965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.4:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1501191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v7.5",
"product": {
"name": "simatic_wincc_v7.5",
"product_id": "CSAFPID-1457966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v7.5:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1501189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_v8.0",
"product": {
"name": "simatic_wincc_v8.0",
"product_id": "CSAFPID-1457967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_wincc_v8.0:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v16",
"product": {
"name": "simocode_es_v16",
"product_id": "CSAFPID-1702694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v17",
"product": {
"name": "simocode_es_v17",
"product_id": "CSAFPID-1703196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v18",
"product": {
"name": "simocode_es_v18",
"product_id": "CSAFPID-1703197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp1",
"product": {
"name": "simotion_scout_tia_v5.4_sp1",
"product_id": "CSAFPID-1703198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.4_sp3",
"product": {
"name": "simotion_scout_tia_v5.4_sp3",
"product_id": "CSAFPID-1703199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.4_sp3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simotion_scout_tia_v5.5_sp1",
"product": {
"name": "simotion_scout_tia_v5.5_sp1",
"product_id": "CSAFPID-1703200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simotion_scout_tia_v5.5_sp1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1625341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive",
"product": {
"name": "sinamics_startdrive",
"product_id": "CSAFPID-1470069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v16",
"product": {
"name": "sinamics_startdrive_v16",
"product_id": "CSAFPID-1703201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v17",
"product": {
"name": "sinamics_startdrive_v17",
"product_id": "CSAFPID-1703202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinamics_startdrive_v18",
"product": {
"name": "sinamics_startdrive_v18",
"product_id": "CSAFPID-1703203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinamics_startdrive_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-746925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_network_management_system",
"product": {
"name": "sinec_network_management_system",
"product_id": "CSAFPID-1691397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-309392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1458012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1693062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1691473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinema_remote_connect_client",
"product": {
"name": "sinema_remote_connect_client",
"product_id": "CSAFPID-894438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1625342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_one_virtual",
"product": {
"name": "sinumerik_one_virtual",
"product_id": "CSAFPID-1470070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_one_virtual:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1625338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinumerik_plc_programming_tool",
"product": {
"name": "sinumerik_plc_programming_tool",
"product_id": "CSAFPID-1470071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinumerik_plc_programming_tool:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siport",
"product": {
"name": "siport",
"product_id": "CSAFPID-1712847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siport:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v17",
"product": {
"name": "sirius_safety_es_v17",
"product_id": "CSAFPID-1703204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_safety_es_v18",
"product": {
"name": "sirius_safety_es_v18",
"product_id": "CSAFPID-1703205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_safety_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v17",
"product": {
"name": "sirius_soft_starter_es_v17",
"product_id": "CSAFPID-1703206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sirius_soft_starter_es_v18",
"product": {
"name": "sirius_soft_starter_es_v18",
"product_id": "CSAFPID-1703207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sirius_soft_starter_es_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "solid_edge_se2024",
"product": {
"name": "solid_edge_se2024",
"product_id": "CSAFPID-1680248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:solid_edge_se2024:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spectrum_power_7",
"product": {
"name": "spectrum_power_7",
"product_id": "CSAFPID-524281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect",
"product": {
"name": "st7_scadaconnect",
"product_id": "CSAFPID-1691077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product": {
"name": "st7_scadaconnect__6nh7997-5da10-0aa0_",
"product_id": "CSAFPID-1703173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:st7_scadaconnect__6nh7997-5da10-0aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic",
"product": {
"name": "telecontrol_server_basic",
"product_id": "CSAFPID-1691051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic:3.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_1000_v3.1",
"product": {
"name": "telecontrol_server_basic_1000_v3.1",
"product_id": "CSAFPID-1712839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_1000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_256_v3.1",
"product": {
"name": "telecontrol_server_basic_256_v3.1",
"product_id": "CSAFPID-1712840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_256_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_32_v3.1",
"product": {
"name": "telecontrol_server_basic_32_v3.1",
"product_id": "CSAFPID-1712841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_32_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_5000_v3.1",
"product": {
"name": "telecontrol_server_basic_5000_v3.1",
"product_id": "CSAFPID-1712842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_5000_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_64_v3.1",
"product": {
"name": "telecontrol_server_basic_64_v3.1",
"product_id": "CSAFPID-1712843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_64_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_8_v3.1",
"product": {
"name": "telecontrol_server_basic_8_v3.1",
"product_id": "CSAFPID-1712844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_8_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_serv_upgr",
"product": {
"name": "telecontrol_server_basic_serv_upgr",
"product_id": "CSAFPID-1712845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_serv_upgr:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_upgr_v3.1",
"product": {
"name": "telecontrol_server_basic_upgr_v3.1",
"product_id": "CSAFPID-1712846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_upgr_v3.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "telecontrol_server_basic_v3",
"product": {
"name": "telecontrol_server_basic_v3",
"product_id": "CSAFPID-1637855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:telecontrol_server_basic_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1625345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_connector",
"product": {
"name": "tia_portal_cloud_connector",
"product_id": "CSAFPID-1470072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_connector:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v16",
"product": {
"name": "tia_portal_cloud_v16",
"product_id": "CSAFPID-1712827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v17",
"product": {
"name": "tia_portal_cloud_v17",
"product_id": "CSAFPID-1712828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "tia_portal_cloud_v18",
"product": {
"name": "tia_portal_cloud_v18",
"product_id": "CSAFPID-1712829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:tia_portal_cloud_v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:15.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-75533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-74792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal",
"product": {
"name": "totally_integrated_automation_portal",
"product_id": "CSAFPID-1472073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal:19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1615531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v15.1",
"product_id": "CSAFPID-1458014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v15.1:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1615256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v16",
"product_id": "CSAFPID-1458015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v16:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1615257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v17",
"product_id": "CSAFPID-1458016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v17:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1615258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v18",
"product_id": "CSAFPID-1458017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v18:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1637618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product": {
"name": "totally_integrated_automation_portal__tia_portal__v19",
"product_id": "CSAFPID-1470073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:totally_integrated_automation_portal__tia_portal__v19:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc",
"product": {
"name": "wincc",
"product_id": "CSAFPID-1625343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "wincc_tia_portal",
"product": {
"name": "wincc_tia_portal",
"product_id": "CSAFPID-465667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500",
"product": {
"name": "simatic_s7-1500",
"product_id": "CSAFPID-715650",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7",
"product": {
"name": "simatic_s7",
"product_id": "CSAFPID-1613729",
"product_identification_helper": {
"cpe": "cpe:2.3:h:siemens:simatic_s7:1500:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1691401",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn\\/dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-715649",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:cpu_1518f-4_pn__dp_mfp_firmware:3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-880853",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808_firmware",
"product": {
"name": "ruggedcom_ape1808_firmware",
"product_id": "CSAFPID-542833",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "security_configuration_tool",
"product": {
"name": "security_configuration_tool",
"product_id": "CSAFPID-540747",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:security_configuration_tool:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7-1500_tm_mfp",
"product_id": "CSAFPID-1693048",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7_-1500_tm_mfp",
"product_id": "CSAFPID-907212",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_simatic_s7_-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_telecontrol_server_basic",
"product": {
"name": "siemens_telecontrol_server_basic",
"product_id": "CSAFPID-907211",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:siemens_telecontrol_server_basic:3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_firmware",
"product": {
"name": "simatic_mv500_firmware",
"product_id": "CSAFPID-1692274",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_mv500_firmware:3.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_net_pc_software",
"product": {
"name": "simatic_net_pc_software",
"product_id": "CSAFPID-1472070",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_7",
"product": {
"name": "simatic_pcs_7",
"product_id": "CSAFPID-1472067",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware",
"product_id": "CSAFPID-1689769",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn\\/dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware",
"product_id": "CSAFPID-766929",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518f-4_pn__dp_mfp_firmware:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-717239",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_firmware",
"product": {
"name": "simatic_s7-1500_tm_mfp_firmware",
"product_id": "CSAFPID-905869",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_s7-1500_tm_mfp_firmware:1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_step_7",
"product": {
"name": "simatic_step_7",
"product_id": "CSAFPID-879652",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_step_7:5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472068",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472066",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc",
"product": {
"name": "simatic_wincc",
"product_id": "CSAFPID-1472072",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_oa",
"product": {
"name": "simatic_wincc_oa",
"product_id": "CSAFPID-1472071",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_oa:3.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_advanced",
"product": {
"name": "simatic_wincc_runtime_advanced",
"product_id": "CSAFPID-886176",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165976",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-165974",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855582",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_wincc_runtime_professional",
"product": {
"name": "simatic_wincc_runtime_professional",
"product_id": "CSAFPID-855580",
"product_identification_helper": {
"cpe": "cpe:2.3:o:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3506",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3506",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3506.json"
}
],
"title": "CVE-2021-3506"
},
{
"cve": "CVE-2023-2975",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-3341",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3341",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3341.json"
}
],
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3446",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703073",
"CSAFPID-309392",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1613729",
"CSAFPID-1703073",
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4236",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4236.json"
}
],
"title": "CVE-2023-4236"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5363",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5363.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-5517",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5517.json"
}
],
"title": "CVE-2023-5517"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1637855",
"CSAFPID-1703131",
"CSAFPID-309392",
"CSAFPID-1703173",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5679",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5679",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5679.json"
}
],
"title": "CVE-2023-5679"
},
{
"cve": "CVE-2023-5680",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-5680",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5680.json"
}
],
"title": "CVE-2023-5680"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6237",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6237.json"
}
],
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6516",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-6516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6516.json"
}
],
"title": "CVE-2023-6516"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-28450",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613504",
"CSAFPID-1613505",
"CSAFPID-1613506",
"CSAFPID-1613507",
"CSAFPID-1613592",
"CSAFPID-1613593",
"CSAFPID-1613594",
"CSAFPID-1613595",
"CSAFPID-1613596",
"CSAFPID-1613597",
"CSAFPID-1613598"
]
}
],
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-30584",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-30584",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-30584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-32002",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Policy Privileges are not Assigned Consistently Between Control and Data Agents",
"title": "CWE-1268"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32002",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32002.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32003",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32003.json"
}
],
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32005",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32005.json"
}
],
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Exposure of Sensitive Information Due to Incompatible Policies",
"title": "CWE-213"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32558",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32736",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32736",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712825",
"CSAFPID-1712826",
"CSAFPID-1703190",
"CSAFPID-1703191",
"CSAFPID-1500667",
"CSAFPID-1703187",
"CSAFPID-1703188",
"CSAFPID-1703189",
"CSAFPID-1703192",
"CSAFPID-1703193",
"CSAFPID-1703194",
"CSAFPID-1702687",
"CSAFPID-1702688",
"CSAFPID-1703195",
"CSAFPID-1702694",
"CSAFPID-1703196",
"CSAFPID-1703197",
"CSAFPID-1703198",
"CSAFPID-1703199",
"CSAFPID-1703200",
"CSAFPID-1703201",
"CSAFPID-1703202",
"CSAFPID-1703203",
"CSAFPID-1703204",
"CSAFPID-1703205",
"CSAFPID-1703206",
"CSAFPID-1703207",
"CSAFPID-1712827",
"CSAFPID-1712828",
"CSAFPID-1712829"
]
}
],
"title": "CVE-2023-32736"
},
{
"cve": "CVE-2023-38552",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38552.json"
}
],
"title": "CVE-2023-38552"
},
{
"cve": "CVE-2023-38709",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-38709",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38709.json"
}
],
"title": "CVE-2023-38709"
},
{
"cve": "CVE-2023-39331",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39331.json"
}
],
"title": "CVE-2023-39331"
},
{
"cve": "CVE-2023-39332",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39332",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39332.json"
}
],
"title": "CVE-2023-39332"
},
{
"cve": "CVE-2023-39333",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-39333",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39333.json"
}
],
"title": "CVE-2023-39333"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-309392",
"CSAFPID-1615259",
"CSAFPID-1703173"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45143",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45143.json"
}
],
"title": "CVE-2023-45143"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703180",
"CSAFPID-1703181",
"CSAFPID-1703182",
"CSAFPID-1703183",
"CSAFPID-1703184",
"CSAFPID-1703185",
"CSAFPID-1703186"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46280",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46280",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1458012",
"CSAFPID-309392",
"CSAFPID-1625338",
"CSAFPID-1625340",
"CSAFPID-1625341",
"CSAFPID-75563",
"CSAFPID-1625342",
"CSAFPID-165765",
"CSAFPID-1625345",
"CSAFPID-766087",
"CSAFPID-1637559",
"CSAFPID-1637560",
"CSAFPID-1637561",
"CSAFPID-1637909",
"CSAFPID-1637910",
"CSAFPID-1637849",
"CSAFPID-1637850",
"CSAFPID-1637851",
"CSAFPID-1637911",
"CSAFPID-1501190",
"CSAFPID-1637912",
"CSAFPID-1637856",
"CSAFPID-1637913",
"CSAFPID-1637914",
"CSAFPID-1637915",
"CSAFPID-1637916",
"CSAFPID-1637917",
"CSAFPID-1637887",
"CSAFPID-1501188",
"CSAFPID-1501192",
"CSAFPID-1637854",
"CSAFPID-1501193",
"CSAFPID-1501191",
"CSAFPID-1501189",
"CSAFPID-1615531",
"CSAFPID-1615256",
"CSAFPID-1615257",
"CSAFPID-1615258",
"CSAFPID-1637618",
"CSAFPID-1470060",
"CSAFPID-1470061",
"CSAFPID-1470062",
"CSAFPID-1470063",
"CSAFPID-1470064",
"CSAFPID-1457909",
"CSAFPID-1470065",
"CSAFPID-1470066",
"CSAFPID-1457855",
"CSAFPID-1457956",
"CSAFPID-1457957",
"CSAFPID-1457958",
"CSAFPID-1470067",
"CSAFPID-1457960",
"CSAFPID-1457961",
"CSAFPID-1457962",
"CSAFPID-1457963",
"CSAFPID-1470068",
"CSAFPID-1457965",
"CSAFPID-1457966",
"CSAFPID-1457967",
"CSAFPID-1470069",
"CSAFPID-1470070",
"CSAFPID-1470071",
"CSAFPID-1470072",
"CSAFPID-1458014",
"CSAFPID-1458015",
"CSAFPID-1458016",
"CSAFPID-1458017",
"CSAFPID-1470073",
"CSAFPID-75533",
"CSAFPID-1472069",
"CSAFPID-1472073",
"CSAFPID-74792",
"CSAFPID-74794",
"CSAFPID-1457906",
"CSAFPID-1457907",
"CSAFPID-1457908"
]
}
],
"title": "CVE-2023-46280"
},
{
"cve": "CVE-2023-46809",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-46809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46809.json"
}
],
"title": "CVE-2023-46809"
},
{
"cve": "CVE-2023-47038",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47038",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47038.json"
}
],
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-47039",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-47039",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47039.json"
}
],
"title": "CVE-2023-47039"
},
{
"cve": "CVE-2023-47100",
"references": [
{
"category": "self",
"summary": "CVE-2023-47100",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47100.json"
}
],
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1615259",
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49441",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-49441",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49441.json"
}
],
"title": "CVE-2023-49441"
},
{
"cve": "CVE-2023-50387",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50387.json"
}
],
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-52389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52389",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52389.json"
}
],
"title": "CVE-2023-52389"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1613729",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Interpretation Conflict",
"title": "CWE-436"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2379",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2379"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-894438"
]
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1615260",
"CSAFPID-1615261",
"CSAFPID-1615262",
"CSAFPID-1615263",
"CSAFPID-1615264",
"CSAFPID-1703131"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5594",
"references": [
{
"category": "self",
"summary": "CVE-2024-5594",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5594.json"
}
],
"title": "CVE-2024-5594"
},
{
"cve": "CVE-2024-21890",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Insufficient Technical Documentation",
"title": "CWE-1059"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21890.json"
}
],
"title": "CVE-2024-21890"
},
{
"cve": "CVE-2024-21891",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21891.json"
}
],
"title": "CVE-2024-21891"
},
{
"cve": "CVE-2024-21892",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21892.json"
}
],
"title": "CVE-2024-21892"
},
{
"cve": "CVE-2024-21896",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-21896",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21896.json"
}
],
"title": "CVE-2024-21896"
},
{
"cve": "CVE-2024-22017",
"cwe": {
"id": "CWE-271",
"name": "Privilege Dropping / Lowering Errors"
},
"notes": [
{
"category": "other",
"text": "Privilege Dropping / Lowering Errors",
"title": "CWE-271"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22017",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22017.json"
}
],
"title": "CVE-2024-22017"
},
{
"cve": "CVE-2024-22019",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22019",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json"
}
],
"title": "CVE-2024-22019"
},
{
"cve": "CVE-2024-22025",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-22025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22025.json"
}
],
"title": "CVE-2024-22025"
},
{
"cve": "CVE-2024-24758",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Policy with Untrusted Domains"
},
"notes": [
{
"category": "other",
"text": "Permissive Cross-domain Policy with Untrusted Domains",
"title": "CWE-942"
},
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24758",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24758.json"
}
],
"title": "CVE-2024-24758"
},
{
"cve": "CVE-2024-24795",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24795.json"
}
],
"title": "CVE-2024-24795"
},
{
"cve": "CVE-2024-24806",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-24806",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24806.json"
}
],
"title": "CVE-2024-24806"
},
{
"cve": "CVE-2024-26306",
"cwe": {
"id": "CWE-310",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26306",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26306.json"
}
],
"title": "CVE-2024-26306"
},
{
"cve": "CVE-2024-26925",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26925",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26925.json"
}
],
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-27316",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27316",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json"
}
],
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-27980",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27980",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27980.json"
}
],
"title": "CVE-2024-27980"
},
{
"cve": "CVE-2024-27982",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27982",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27982.json"
}
],
"title": "CVE-2024-27982"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28882",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-28882",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28882.json"
}
],
"title": "CVE-2024-28882"
},
{
"cve": "CVE-2024-29119",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
}
],
"product_status": {
"known_affected": [
"CSAFPID-524281"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-524281"
]
}
],
"title": "CVE-2024-29119"
},
{
"cve": "CVE-2024-36140",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36140.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1712832",
"CSAFPID-1712833"
]
}
],
"title": "CVE-2024-36140"
},
{
"cve": "CVE-2024-44102",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-44102",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44102.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712834",
"CSAFPID-1712835",
"CSAFPID-1712836",
"CSAFPID-1712837",
"CSAFPID-1712838",
"CSAFPID-1712839",
"CSAFPID-1712840",
"CSAFPID-1712841",
"CSAFPID-1712842",
"CSAFPID-1712843",
"CSAFPID-1712844",
"CSAFPID-1712845",
"CSAFPID-1712846"
]
}
],
"title": "CVE-2024-44102"
},
{
"cve": "CVE-2024-46888",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46888",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46888.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46888"
},
{
"cve": "CVE-2024-46889",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46889",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46889"
},
{
"cve": "CVE-2024-46890",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46890",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46890.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46890"
},
{
"cve": "CVE-2024-46891",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46891"
},
{
"cve": "CVE-2024-46892",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "other",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46892",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46892.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46892"
},
{
"cve": "CVE-2024-46894",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-746925"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-46894",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-46894.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-746925"
]
}
],
"title": "CVE-2024-46894"
},
{
"cve": "CVE-2024-47783",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712847"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47783",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1712847"
]
}
],
"title": "CVE-2024-47783"
},
{
"cve": "CVE-2024-47808",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-309392"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47808",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-309392"
]
}
],
"title": "CVE-2024-47808"
},
{
"cve": "CVE-2024-47940",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47940",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47940.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47940"
},
{
"cve": "CVE-2024-47941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47941",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47941.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47941"
},
{
"cve": "CVE-2024-47942",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1680248"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47942",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47942.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1680248"
]
}
],
"title": "CVE-2024-47942"
},
{
"cve": "CVE-2024-50310",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1712748"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50310",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50310.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1712748"
]
}
],
"title": "CVE-2024-50310"
},
{
"cve": "CVE-2024-50313",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50313",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50313.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1637622",
"CSAFPID-1637623",
"CSAFPID-1637624",
"CSAFPID-1637625",
"CSAFPID-1637626"
]
}
],
"title": "CVE-2024-50313"
},
{
"cve": "CVE-2024-50557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50557"
},
{
"cve": "CVE-2024-50558",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50558"
},
{
"cve": "CVE-2024-50559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50559"
},
{
"cve": "CVE-2024-50560",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50560",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50560.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50560"
},
{
"cve": "CVE-2024-50561",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50561"
},
{
"cve": "CVE-2024-50572",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1702670",
"CSAFPID-1702671",
"CSAFPID-1702672",
"CSAFPID-1712749",
"CSAFPID-1712750",
"CSAFPID-1702677",
"CSAFPID-1702678",
"CSAFPID-1702679",
"CSAFPID-1712751",
"CSAFPID-1712752",
"CSAFPID-1702681",
"CSAFPID-1712753",
"CSAFPID-1702682",
"CSAFPID-1702683",
"CSAFPID-1712754",
"CSAFPID-1712755",
"CSAFPID-1712756",
"CSAFPID-1712757",
"CSAFPID-1712758",
"CSAFPID-1712759",
"CSAFPID-1702684",
"CSAFPID-1702685",
"CSAFPID-1712760",
"CSAFPID-1712761"
]
}
],
"title": "CVE-2024-50572"
}
]
}
ncsc-2025-0051
Vulnerability from csaf_ncscnl
Published
2025-02-11 19:40
Modified
2025-02-11 19:40
Summary
Kwetsbaarheden verholpen in Siemens producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Siemens heeft kwetsbaarheden verholpen in diverse producten als APOGEE, Opcenter, RUGGEDCOM, SCALANCE, SIMATIC, SIPROTEC en Teamcenter.
Interpretaties
De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Cross-Site-Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Manipulatie van gegevens
- Omzeilen van een beveiligingsmaatregel
- Omzeilen van authenticatie
- (Remote) code execution (root/admin rechten)
- (Remote) code execution (Gebruikersrechten)
- Toegang tot systeemgegevens
- Toegang tot gevoelige gegevens
De kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.
Oplossingen
Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico's zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-489
Active Debug Code
CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CWE-606
Unchecked Input for Loop Condition
CWE-170
Improper Null Termination
CWE-1395
Dependency on Vulnerable Third-Party Component
CWE-183
Permissive List of Allowed Inputs
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-385
Covert Timing Channel
CWE-1392
Use of Default Credentials
CWE-222
Truncation of Security-relevant Information
CWE-310
CWE-310
CWE-328
Use of Weak Hash
CWE-304
Missing Critical Step in Authentication
CWE-684
Incorrect Provision of Specified Functionality
CWE-208
Observable Timing Discrepancy
CWE-326
Inadequate Encryption Strength
CWE-923
Improper Restriction of Communication Channel to Intended Endpoints
CWE-201
Insertion of Sensitive Information Into Sent Data
CWE-347
Improper Verification of Cryptographic Signature
CWE-834
Excessive Iteration
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-425
Direct Request ('Forced Browsing')
CWE-440
Expected Behavior Violation
CWE-704
Incorrect Type Conversion or Cast
CWE-415
Double Free
CWE-1286
Improper Validation of Syntactic Correctness of Input
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-610
Externally Controlled Reference to a Resource in Another Sphere
CWE-613
Insufficient Session Expiration
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-312
Cleartext Storage of Sensitive Information
CWE-369
Divide By Zero
CWE-252
Unchecked Return Value
CWE-203
Observable Discrepancy
CWE-354
Improper Validation of Integrity Check Value
CWE-325
Missing Cryptographic Step
CWE-190
Integer Overflow or Wraparound
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-416
Use After Free
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-757
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-436
Interpretation Conflict
CWE-400
Uncontrolled Resource Consumption
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in diverse producten als APOGEE, Opcenter, RUGGEDCOM, SCALANCE, SIMATIC, SIPROTEC en Teamcenter.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Cross-Site-Scripting (XSS)\n- Cross-Site Request Forgery (CSRF)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Omzeilen van authenticatie\n- (Remote) code execution (root/admin rechten)\n- (Remote) code execution (Gebruikersrechten)\n- Toegang tot systeemgegevens\n- Toegang tot gevoelige gegevens\n\nDe kwaadwillende heeft hiervoor toegang nodig tot de productieomgeving. Het is goed gebruik een dergelijke omgeving niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Active Debug Code",
"title": "CWE-489"
},
{
"category": "general",
"text": "Use of a Cryptographic Primitive with a Risky Implementation",
"title": "CWE-1240"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Improper Null Termination",
"title": "CWE-170"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Permissive List of Allowed Inputs",
"title": "CWE-183"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Use of Default Credentials",
"title": "CWE-1392"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "CWE-310",
"title": "CWE-310"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "general",
"text": "Incorrect Provision of Specified Functionality",
"title": "CWE-684"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Improper Restriction of Communication Channel to Intended Endpoints",
"title": "CWE-923"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Direct Request (\u0027Forced Browsing\u0027)",
"title": "CWE-425"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Incorrect Type Conversion or Cast",
"title": "CWE-704"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Externally Controlled Reference to a Resource in Another Sphere",
"title": "CWE-610"
},
{
"category": "general",
"text": "Insufficient Session Expiration",
"title": "CWE-613"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Cleartext Storage of Sensitive Information",
"title": "CWE-312"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Interpretation Conflict",
"title": "CWE-436"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-111547.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-195895.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-224824.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-246355.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-342348.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-369369.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-615116.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637914.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-647005.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-656895.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-687955.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-767615.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-769027.pdf"
},
{
"category": "external",
"summary": "Reference - ncscclear",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770770.pdf"
}
],
"title": "Kwetsbaarheden verholpen in Siemens producten",
"tracking": {
"current_release_date": "2025-02-11T19:40:34.993264Z",
"id": "NCSC-2025-0051",
"initial_release_date": "2025-02-11T19:40:34.993264Z",
"revision_history": [
{
"date": "2025-02-11T19:40:34.993264Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "_simatic_process_historian_2019_opc_ua_server",
"product": {
"name": "_simatic_process_historian_2019_opc_ua_server",
"product_id": "CSAFPID-1744015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_process_historian_2019_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_process_historian_2020_opc_ua_server",
"product": {
"name": "_simatic_process_historian_2020_opc_ua_server",
"product_id": "CSAFPID-1744016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_process_historian_2020_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_process_historian_2022_opc_ua_server",
"product": {
"name": "_simatic_process_historian_2022_opc_ua_server",
"product_id": "CSAFPID-1744019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_process_historian_2022_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1737274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1510sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1737261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1510sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1737259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1511f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1737267",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1511tf-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1737275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1513f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1737287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1514sp-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1737284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1514spt-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1737298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1514spt_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1737281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1515-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1515r-2_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1515r-2_pn",
"product_id": "CSAFPID-1737280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1515r-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_simatic_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "_simatic_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1737294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_simatic_s7-1500_cpu_1517h-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_et_200sp_cpu_1510sp_f-1_pn",
"product": {
"name": "_siplus_et_200sp_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1737301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_et_200sp_cpu_1510sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_s7-1500_cpu_1511-1_pn",
"product": {
"name": "_siplus_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1737262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_s7-1500_cpu_1511-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product": {
"name": "_siplus_s7-1500_cpu_1511-1_pn_tx_rail",
"product_id": "CSAFPID-1737283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_s7-1500_cpu_1511-1_pn_tx_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "_siplus_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1737264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_s7-1500_cpu_1511f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_s7-1500_cpu_1513-1_pn",
"product": {
"name": "_siplus_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1737255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_s7-1500_cpu_1513-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "_siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product": {
"name": "_siplus_s7-1500_cpu_1515f-2_pn_t2_rail",
"product_id": "CSAFPID-1737295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:_siplus_s7-1500_cpu_1515f-2_pn_t2_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "apogee_pxc_series__bacnet_",
"product": {
"name": "apogee_pxc_series__bacnet_",
"product_id": "CSAFPID-1702551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:apogee_pxc_series__bacnet_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "apogee_pxc_series__p2_ethernet_",
"product": {
"name": "apogee_pxc_series__p2_ethernet_",
"product_id": "CSAFPID-1702739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:apogee_pxc_series__p2_ethernet_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1760815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1760892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1760974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761026",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761052",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc",
"product": {
"name": "dc",
"product_id": "CSAFPID-1761130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1760816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1760893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1760975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761105",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dc_rail",
"product": {
"name": "dc_rail",
"product_id": "CSAFPID-1761131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dc_rail:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp",
"product": {
"name": "dp",
"product_id": "CSAFPID-1760817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp",
"product": {
"name": "dp",
"product_id": "CSAFPID-1760894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_mfp",
"product": {
"name": "dp_mfp",
"product_id": "CSAFPID-1760818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_mfp:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "dp_mfp",
"product": {
"name": "dp_mfp",
"product_id": "CSAFPID-1760895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:dp_mfp:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "modelsim",
"product": {
"name": "modelsim",
"product_id": "CSAFPID-718304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:modelsim:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "modelsim",
"product": {
"name": "modelsim",
"product_id": "CSAFPID-1761156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:modelsim:2025:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "opcenter_intelligence",
"product": {
"name": "opcenter_intelligence",
"product_id": "CSAFPID-1702007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1702558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1760969",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1760970",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1760971",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1760972",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-598353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "openv2g",
"product": {
"name": "openv2g",
"product_id": "CSAFPID-1760973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:openv2g:0.9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "questa",
"product": {
"name": "questa",
"product_id": "CSAFPID-718303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:questa:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "questa",
"product": {
"name": "questa",
"product_id": "CSAFPID-1761157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:questa:2025:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1760819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1760896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1760976",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761054",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761106",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "rly",
"product": {
"name": "rly",
"product_id": "CSAFPID-1761132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:rly:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_ape1808",
"product": {
"name": "ruggedcom_ape1808",
"product_id": "CSAFPID-1615259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_ape1808:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1702670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1476121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu",
"product_id": "CSAFPID-1476210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__eu__6gk6108-4am00-2ba2_",
"product": {
"name": "ruggedcom_rm1224_lte_4g__eu__6gk6108-4am00-2ba2_",
"product_id": "CSAFPID-1613196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__eu__6gk6108-4am00-2ba2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1702671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1476122",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam",
"product_id": "CSAFPID-1476211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "ruggedcom_rm1224_lte_4g__nam__6gk6108-4am00-2da2_",
"product": {
"name": "ruggedcom_rm1224_lte_4g__nam__6gk6108-4am00-2da2_",
"product_id": "CSAFPID-1613197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:ruggedcom_rm1224_lte_4g__nam__6gk6108-4am00-2da2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1702672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1476123",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb",
"product": {
"name": "scalance_m804pb",
"product_id": "CSAFPID-1476212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m804pb__6gk5804-0ap00-2aa2_",
"product": {
"name": "scalance_m804pb__6gk5804-0ap00-2aa2_",
"product_id": "CSAFPID-1613315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m804pb__6gk5804-0ap00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1712749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router",
"product": {
"name": "scalance_m812-1_adsl-router",
"product_id": "CSAFPID-1614940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__6gk5812-1aa00-2aa2_",
"product": {
"name": "scalance_m812-1_adsl-router__6gk5812-1aa00-2aa2_",
"product_id": "CSAFPID-1613316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__6gk5812-1aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__6gk5812-1ba00-2aa2_",
"product": {
"name": "scalance_m812-1_adsl-router__6gk5812-1ba00-2aa2_",
"product_id": "CSAFPID-1613317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__6gk5812-1ba00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_a_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_a_",
"product_id": "CSAFPID-1476124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_a_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_a_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_a_",
"product_id": "CSAFPID-1476213",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_a_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_a___6gk5812-1aa00-2aa2_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_a___6gk5812-1aa00-2aa2_",
"product_id": "CSAFPID-1702753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_a___6gk5812-1aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_b_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_b_",
"product_id": "CSAFPID-1476125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_b_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_b_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_b_",
"product_id": "CSAFPID-1476214",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_b_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m812-1_adsl-router__annex_b___6gk5812-1ba00-2aa2_",
"product": {
"name": "scalance_m812-1_adsl-router__annex_b___6gk5812-1ba00-2aa2_",
"product_id": "CSAFPID-1702754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m812-1_adsl-router__annex_b___6gk5812-1ba00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1712750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router",
"product": {
"name": "scalance_m816-1_adsl-router",
"product_id": "CSAFPID-1614941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__6gk5816-1aa00-2aa2_",
"product": {
"name": "scalance_m816-1_adsl-router__6gk5816-1aa00-2aa2_",
"product_id": "CSAFPID-1613318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__6gk5816-1aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__6gk5816-1ba00-2aa2_",
"product": {
"name": "scalance_m816-1_adsl-router__6gk5816-1ba00-2aa2_",
"product_id": "CSAFPID-1613319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__6gk5816-1ba00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_a_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_a_",
"product_id": "CSAFPID-1476126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_a_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_a_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_a_",
"product_id": "CSAFPID-1476215",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_a_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_a___6gk5816-1aa00-2aa2_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_a___6gk5816-1aa00-2aa2_",
"product_id": "CSAFPID-1702755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_a___6gk5816-1aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_b_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_b_",
"product_id": "CSAFPID-1476127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_b_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_b_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_b_",
"product_id": "CSAFPID-1476216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_b_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m816-1_adsl-router__annex_b___6gk5816-1ba00-2aa2_",
"product": {
"name": "scalance_m816-1_adsl-router__annex_b___6gk5816-1ba00-2aa2_",
"product_id": "CSAFPID-1702756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m816-1_adsl-router__annex_b___6gk5816-1ba00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1702677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1476128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router",
"product": {
"name": "scalance_m826-2_shdsl-router",
"product_id": "CSAFPID-1476217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m826-2_shdsl-router__6gk5826-2ab00-2ab2_",
"product": {
"name": "scalance_m826-2_shdsl-router__6gk5826-2ab00-2ab2_",
"product_id": "CSAFPID-1613320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m826-2_shdsl-router__6gk5826-2ab00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1702678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1476129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2",
"product": {
"name": "scalance_m874-2",
"product_id": "CSAFPID-1476218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-2__6gk5874-2aa00-2aa2_",
"product": {
"name": "scalance_m874-2__6gk5874-2aa00-2aa2_",
"product_id": "CSAFPID-1613321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-2__6gk5874-2aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1702679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1476130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3",
"product": {
"name": "scalance_m874-3",
"product_id": "CSAFPID-1476219",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn_",
"product": {
"name": "scalance_m874-3_3g-router__cn_",
"product_id": "CSAFPID-1712751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3_3g-router__cn___6gk5874-3aa00-2fa2_",
"product": {
"name": "scalance_m874-3_3g-router__cn___6gk5874-3aa00-2fa2_",
"product_id": "CSAFPID-1613323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3_3g-router__cn___6gk5874-3aa00-2fa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m874-3__6gk5874-3aa00-2aa2_",
"product": {
"name": "scalance_m874-3__6gk5874-3aa00-2aa2_",
"product_id": "CSAFPID-1613322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m874-3__6gk5874-3aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1712752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3",
"product": {
"name": "scalance_m876-3",
"product_id": "CSAFPID-1614942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__6gk5876-3aa02-2ba2_",
"product": {
"name": "scalance_m876-3__6gk5876-3aa02-2ba2_",
"product_id": "CSAFPID-1613324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__6gk5876-3aa02-2ba2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__evdo_",
"product": {
"name": "scalance_m876-3__evdo_",
"product_id": "CSAFPID-1476131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__evdo_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__evdo_",
"product": {
"name": "scalance_m876-3__evdo_",
"product_id": "CSAFPID-1476220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__evdo_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__evdo___6gk5876-3aa02-2ba2_",
"product": {
"name": "scalance_m876-3__evdo___6gk5876-3aa02-2ba2_",
"product_id": "CSAFPID-1702757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__evdo___6gk5876-3aa02-2ba2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1702681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1476132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok_",
"product": {
"name": "scalance_m876-3__rok_",
"product_id": "CSAFPID-1476221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-3__rok___6gk5876-3aa02-2ea2_",
"product": {
"name": "scalance_m876-3__rok___6gk5876-3aa02-2ea2_",
"product_id": "CSAFPID-1613325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-3__rok___6gk5876-3aa02-2ea2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1712753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1476133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4",
"product": {
"name": "scalance_m876-4",
"product_id": "CSAFPID-1476222",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__6gk5876-4aa10-2ba2_",
"product": {
"name": "scalance_m876-4__6gk5876-4aa10-2ba2_",
"product_id": "CSAFPID-1613326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__6gk5876-4aa10-2ba2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1702682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1476134",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu_",
"product": {
"name": "scalance_m876-4__eu_",
"product_id": "CSAFPID-1476223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__eu___6gk5876-4aa00-2ba2_",
"product": {
"name": "scalance_m876-4__eu___6gk5876-4aa00-2ba2_",
"product_id": "CSAFPID-1613327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__eu___6gk5876-4aa00-2ba2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1702683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1476135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam_",
"product": {
"name": "scalance_m876-4__nam_",
"product_id": "CSAFPID-1476224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_m876-4__nam___6gk5876-4aa00-2da2_",
"product": {
"name": "scalance_m876-4__nam___6gk5876-4aa00-2da2_",
"product_id": "CSAFPID-1613328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_m876-4__nam___6gk5876-4aa00-2da2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1_",
"product": {
"name": "scalance_mum853-1__a1_",
"product_id": "CSAFPID-1712754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__a1___6gk5853-2ea10-2aa1_",
"product": {
"name": "scalance_mum853-1__a1___6gk5853-2ea10-2aa1_",
"product_id": "CSAFPID-1613329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__a1___6gk5853-2ea10-2aa1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1_",
"product": {
"name": "scalance_mum853-1__b1_",
"product_id": "CSAFPID-1712755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__b1___6gk5853-2ea10-2ba1_",
"product": {
"name": "scalance_mum853-1__b1___6gk5853-2ea10-2ba1_",
"product_id": "CSAFPID-1613330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__b1___6gk5853-2ea10-2ba1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1712756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1476136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu_",
"product": {
"name": "scalance_mum853-1__eu_",
"product_id": "CSAFPID-1476225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum853-1__eu___6gk5853-2ea00-2da1_",
"product": {
"name": "scalance_mum853-1__eu___6gk5853-2ea00-2da1_",
"product_id": "CSAFPID-1613331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum853-1__eu___6gk5853-2ea00-2da1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1_",
"product": {
"name": "scalance_mum856-1__a1_",
"product_id": "CSAFPID-1712757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__a1___6gk5856-2ea10-3aa1_",
"product": {
"name": "scalance_mum856-1__a1___6gk5856-2ea10-3aa1_",
"product_id": "CSAFPID-1613332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__a1___6gk5856-2ea10-3aa1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1_",
"product": {
"name": "scalance_mum856-1__b1_",
"product_id": "CSAFPID-1712758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__b1___6gk5856-2ea10-3ba1_",
"product": {
"name": "scalance_mum856-1__b1___6gk5856-2ea10-3ba1_",
"product_id": "CSAFPID-1613333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__b1___6gk5856-2ea10-3ba1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn_",
"product": {
"name": "scalance_mum856-1__cn_",
"product_id": "CSAFPID-1712759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__cn___6gk5856-2ea00-3fa1_",
"product": {
"name": "scalance_mum856-1__cn___6gk5856-2ea00-3fa1_",
"product_id": "CSAFPID-1613334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__cn___6gk5856-2ea00-3fa1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1702684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1476137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu_",
"product": {
"name": "scalance_mum856-1__eu_",
"product_id": "CSAFPID-1476226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__eu___6gk5856-2ea00-3da1_",
"product": {
"name": "scalance_mum856-1__eu___6gk5856-2ea00-3da1_",
"product_id": "CSAFPID-1613335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__eu___6gk5856-2ea00-3da1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1702685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1476138",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row_",
"product": {
"name": "scalance_mum856-1__row_",
"product_id": "CSAFPID-1476227",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row_:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_mum856-1__row___6gk5856-2ea00-3aa1_",
"product": {
"name": "scalance_mum856-1__row___6gk5856-2ea00-3aa1_",
"product_id": "CSAFPID-1613336",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_mum856-1__row___6gk5856-2ea00-3aa1_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615",
"product": {
"name": "scalance_s615",
"product_id": "CSAFPID-1476139",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615",
"product": {
"name": "scalance_s615",
"product_id": "CSAFPID-1476228",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615__6gk5615-0aa00-2aa2_",
"product": {
"name": "scalance_s615__6gk5615-0aa00-2aa2_",
"product_id": "CSAFPID-1702758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615__6gk5615-0aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec",
"product": {
"name": "scalance_s615_eec",
"product_id": "CSAFPID-1476140",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec",
"product": {
"name": "scalance_s615_eec",
"product_id": "CSAFPID-1476229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec:all_versions:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec__6gk5615-0aa01-2aa2_",
"product": {
"name": "scalance_s615_eec__6gk5615-0aa01-2aa2_",
"product_id": "CSAFPID-1702759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec__6gk5615-0aa01-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1712760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router",
"product": {
"name": "scalance_s615_eec_lan-router",
"product_id": "CSAFPID-1614943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_eec_lan-router__6gk5615-0aa01-2aa2_",
"product": {
"name": "scalance_s615_eec_lan-router__6gk5615-0aa01-2aa2_",
"product_id": "CSAFPID-1613337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_eec_lan-router__6gk5615-0aa01-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1712761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router",
"product": {
"name": "scalance_s615_lan-router",
"product_id": "CSAFPID-1614944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_s615_lan-router__6gk5615-0aa00-2aa2_",
"product": {
"name": "scalance_s615_lan-router__6gk5615-0aa00-2aa2_",
"product_id": "CSAFPID-1613338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_s615_lan-router__6gk5615-0aa00-2aa2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc622-2c",
"product": {
"name": "scalance_sc622-2c",
"product_id": "CSAFPID-1476102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc622-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc622-2c__6gk5622-2gs00-2ac2_",
"product": {
"name": "scalance_sc622-2c__6gk5622-2gs00-2ac2_",
"product_id": "CSAFPID-1613339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc622-2c__6gk5622-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc626-2c",
"product": {
"name": "scalance_sc626-2c",
"product_id": "CSAFPID-1476104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc626-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc626-2c__6gk5626-2gs00-2ac2_",
"product": {
"name": "scalance_sc626-2c__6gk5626-2gs00-2ac2_",
"product_id": "CSAFPID-1613340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc626-2c__6gk5626-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc632-2c",
"product": {
"name": "scalance_sc632-2c",
"product_id": "CSAFPID-1476106",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc632-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc632-2c__6gk5632-2gs00-2ac2_",
"product": {
"name": "scalance_sc632-2c__6gk5632-2gs00-2ac2_",
"product_id": "CSAFPID-1613341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc632-2c__6gk5632-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc636-2c",
"product": {
"name": "scalance_sc636-2c",
"product_id": "CSAFPID-1476108",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc636-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc636-2c__6gk5636-2gs00-2ac2_",
"product": {
"name": "scalance_sc636-2c__6gk5636-2gs00-2ac2_",
"product_id": "CSAFPID-1613342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc636-2c__6gk5636-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc642-2c",
"product": {
"name": "scalance_sc642-2c",
"product_id": "CSAFPID-1476110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc642-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc642-2c__6gk5642-2gs00-2ac2_",
"product": {
"name": "scalance_sc642-2c__6gk5642-2gs00-2ac2_",
"product_id": "CSAFPID-1613343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc642-2c__6gk5642-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc646-2c",
"product": {
"name": "scalance_sc646-2c",
"product_id": "CSAFPID-1476112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc646-2c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_sc646-2c__6gk5646-2gs00-2ac2_",
"product": {
"name": "scalance_sc646-2c__6gk5646-2gs00-2ac2_",
"product_id": "CSAFPID-1613344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_sc646-2c__6gk5646-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_w1750d__jp___6gk5750-2hx01-1ad0_",
"product": {
"name": "scalance_w1750d__jp___6gk5750-2hx01-1ad0_",
"product_id": "CSAFPID-1701887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_w1750d__jp___6gk5750-2hx01-1ad0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_w1750d__row___6gk5750-2hx01-1aa0_",
"product": {
"name": "scalance_w1750d__row___6gk5750-2hx01-1aa0_",
"product_id": "CSAFPID-1701888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_w1750d__row___6gk5750-2hx01-1aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_w1750d__usa___6gk5750-2hx01-1ab0_",
"product": {
"name": "scalance_w1750d__usa___6gk5750-2hx01-1ab0_",
"product_id": "CSAFPID-1701889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_w1750d__usa___6gk5750-2hx01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1748386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766674",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766675",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1",
"product": {
"name": "scalance_wab762-1",
"product_id": "CSAFPID-1766680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1:2.9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wab762-1__6gk5762-1aj00-6aa0_",
"product": {
"name": "scalance_wab762-1__6gk5762-1aj00-6aa0_",
"product_id": "CSAFPID-1637843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wab762-1__6gk5762-1aj00-6aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1",
"product": {
"name": "scalance_wam763-1",
"product_id": "CSAFPID-904449",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1__6gk5763-1al00-7da0_",
"product": {
"name": "scalance_wam763-1__6gk5763-1al00-7da0_",
"product_id": "CSAFPID-1613400",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1__6gk5763-1al00-7da0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1__me_",
"product": {
"name": "scalance_wam763-1__me_",
"product_id": "CSAFPID-1748387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1__me_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1__me___6gk5763-1al00-7dc0_",
"product": {
"name": "scalance_wam763-1__me___6gk5763-1al00-7dc0_",
"product_id": "CSAFPID-1613401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1__me___6gk5763-1al00-7dc0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1__us_",
"product": {
"name": "scalance_wam763-1__us_",
"product_id": "CSAFPID-1748388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1__us_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam763-1__us___6gk5763-1al00-7db0_",
"product": {
"name": "scalance_wam763-1__us___6gk5763-1al00-7db0_",
"product_id": "CSAFPID-1613402",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam763-1__us___6gk5763-1al00-7db0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1",
"product": {
"name": "scalance_wam766-1",
"product_id": "CSAFPID-904450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1__6gk5766-1ge00-7da0_",
"product": {
"name": "scalance_wam766-1__6gk5766-1ge00-7da0_",
"product_id": "CSAFPID-1749557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1__6gk5766-1ge00-7da0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1__me_",
"product": {
"name": "scalance_wam766-1__me_",
"product_id": "CSAFPID-1748390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1__me_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1__me___6gk5766-1ge00-7dc0_",
"product": {
"name": "scalance_wam766-1__me___6gk5766-1ge00-7dc0_",
"product_id": "CSAFPID-1613404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1__me___6gk5766-1ge00-7dc0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1__us_",
"product": {
"name": "scalance_wam766-1__us_",
"product_id": "CSAFPID-1748391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1__us_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1__us___6gk5766-1ge00-7db0_",
"product": {
"name": "scalance_wam766-1__us___6gk5766-1ge00-7db0_",
"product_id": "CSAFPID-1613405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1__us___6gk5766-1ge00-7db0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec",
"product": {
"name": "scalance_wam766-1_eec",
"product_id": "CSAFPID-904451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec__6gk5766-1ge00-7ta0_",
"product": {
"name": "scalance_wam766-1_eec__6gk5766-1ge00-7ta0_",
"product_id": "CSAFPID-1749558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec__6gk5766-1ge00-7ta0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec__me_",
"product": {
"name": "scalance_wam766-1_eec__me_",
"product_id": "CSAFPID-1748393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec__me_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec__me___6gk5766-1ge00-7tc0_",
"product": {
"name": "scalance_wam766-1_eec__me___6gk5766-1ge00-7tc0_",
"product_id": "CSAFPID-1613407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec__me___6gk5766-1ge00-7tc0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec__us_",
"product": {
"name": "scalance_wam766-1_eec__us_",
"product_id": "CSAFPID-1748394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec__us_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wam766-1_eec__us___6gk5766-1ge00-7tb0_",
"product": {
"name": "scalance_wam766-1_eec__us___6gk5766-1ge00-7tb0_",
"product_id": "CSAFPID-1613408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wam766-1_eec__us___6gk5766-1ge00-7tb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wub762-1",
"product": {
"name": "scalance_wub762-1",
"product_id": "CSAFPID-1748395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wub762-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wub762-1__6gk5762-1aj00-1aa0_",
"product": {
"name": "scalance_wub762-1__6gk5762-1aj00-1aa0_",
"product_id": "CSAFPID-1637844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wub762-1__6gk5762-1aj00-1aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wub762-1_ifeatures",
"product": {
"name": "scalance_wub762-1_ifeatures",
"product_id": "CSAFPID-1749291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wub762-1_ifeatures:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wub762-1_ifeatures__6gk5762-1aj00-2aa0_",
"product": {
"name": "scalance_wub762-1_ifeatures__6gk5762-1aj00-2aa0_",
"product_id": "CSAFPID-1749559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wub762-1_ifeatures__6gk5762-1aj00-2aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1",
"product": {
"name": "scalance_wum763-1",
"product_id": "CSAFPID-904452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1__6gk5763-1al00-3aa0_",
"product": {
"name": "scalance_wum763-1__6gk5763-1al00-3aa0_",
"product_id": "CSAFPID-1613409",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1__6gk5763-1al00-3aa0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1__6gk5763-1al00-3da0_",
"product": {
"name": "scalance_wum763-1__6gk5763-1al00-3da0_",
"product_id": "CSAFPID-1613410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1__6gk5763-1al00-3da0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1__us_",
"product": {
"name": "scalance_wum763-1__us_",
"product_id": "CSAFPID-1748396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1__us_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1__us___6gk5763-1al00-3ab0_",
"product": {
"name": "scalance_wum763-1__us___6gk5763-1al00-3ab0_",
"product_id": "CSAFPID-1613411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1__us___6gk5763-1al00-3ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum763-1__us___6gk5763-1al00-3db0_",
"product": {
"name": "scalance_wum763-1__us___6gk5763-1al00-3db0_",
"product_id": "CSAFPID-1613412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum763-1__us___6gk5763-1al00-3db0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1",
"product": {
"name": "scalance_wum766-1",
"product_id": "CSAFPID-904453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1__6gk5766-1ge00-3da0_",
"product": {
"name": "scalance_wum766-1__6gk5766-1ge00-3da0_",
"product_id": "CSAFPID-1749560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1__6gk5766-1ge00-3da0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1__me_",
"product": {
"name": "scalance_wum766-1__me_",
"product_id": "CSAFPID-1748398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1__me_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1__me___6gk5766-1ge00-3dc0_",
"product": {
"name": "scalance_wum766-1__me___6gk5766-1ge00-3dc0_",
"product_id": "CSAFPID-1613414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1__me___6gk5766-1ge00-3dc0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1__usa_",
"product": {
"name": "scalance_wum766-1__usa_",
"product_id": "CSAFPID-1749290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1__usa_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_wum766-1__usa___6gk5766-1ge00-3db0_",
"product": {
"name": "scalance_wum766-1__usa___6gk5766-1ge00-3db0_",
"product_id": "CSAFPID-1749561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_wum766-1__usa___6gk5766-1ge00-3db0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3",
"product": {
"name": "scalance_xb205-3",
"product_id": "CSAFPID-1743017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__sc__pn_",
"product": {
"name": "scalance_xb205-3__sc__pn_",
"product_id": "CSAFPID-1476141",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__sc__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__sc__pn___6gk5205-3bb00-2ab2_",
"product": {
"name": "scalance_xb205-3__sc__pn___6gk5205-3bb00-2ab2_",
"product_id": "CSAFPID-1613459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__sc__pn___6gk5205-3bb00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__st__e_ip_",
"product": {
"name": "scalance_xb205-3__st__e_ip_",
"product_id": "CSAFPID-1476142",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__st__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__st__e_ip___6gk5205-3bb00-2tb2_",
"product": {
"name": "scalance_xb205-3__st__e_ip___6gk5205-3bb00-2tb2_",
"product_id": "CSAFPID-1613460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__st__e_ip___6gk5205-3bb00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__st__e_ip___6gk5205-3bd00-2tb2_",
"product": {
"name": "scalance_xb205-3__st__e_ip___6gk5205-3bd00-2tb2_",
"product_id": "CSAFPID-1613461",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__st__e_ip___6gk5205-3bd00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__st__pn_",
"product": {
"name": "scalance_xb205-3__st__pn_",
"product_id": "CSAFPID-1476143",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__st__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3__st__pn___6gk5205-3bd00-2ab2_",
"product": {
"name": "scalance_xb205-3__st__pn___6gk5205-3bd00-2ab2_",
"product_id": "CSAFPID-1613462",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3__st__pn___6gk5205-3bd00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3ld",
"product": {
"name": "scalance_xb205-3ld",
"product_id": "CSAFPID-1702580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3ld:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3ld__sc__e_ip_",
"product": {
"name": "scalance_xb205-3ld__sc__e_ip_",
"product_id": "CSAFPID-1476144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3ld__sc__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3ld__sc__e_ip___6gk5205-3bf00-2tb2_",
"product": {
"name": "scalance_xb205-3ld__sc__e_ip___6gk5205-3bf00-2tb2_",
"product_id": "CSAFPID-1613463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3ld__sc__e_ip___6gk5205-3bf00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3ld__sc__pn_",
"product": {
"name": "scalance_xb205-3ld__sc__pn_",
"product_id": "CSAFPID-1476145",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3ld__sc__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb205-3ld__sc__pn___6gk5205-3bf00-2ab2_",
"product": {
"name": "scalance_xb205-3ld__sc__pn___6gk5205-3bf00-2ab2_",
"product_id": "CSAFPID-1613464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb205-3ld__sc__pn___6gk5205-3bf00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb208__e_ip_",
"product": {
"name": "scalance_xb208__e_ip_",
"product_id": "CSAFPID-1476146",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb208__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb208__e_ip___6gk5208-0ba00-2tb2_",
"product": {
"name": "scalance_xb208__e_ip___6gk5208-0ba00-2tb2_",
"product_id": "CSAFPID-1613465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb208__e_ip___6gk5208-0ba00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb208__pn_",
"product": {
"name": "scalance_xb208__pn_",
"product_id": "CSAFPID-1476147",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb208__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb208__pn___6gk5208-0ba00-2ab2_",
"product": {
"name": "scalance_xb208__pn___6gk5208-0ba00-2ab2_",
"product_id": "CSAFPID-1613466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb208__pn___6gk5208-0ba00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3",
"product": {
"name": "scalance_xb213-3",
"product_id": "CSAFPID-1743014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__sc__e_ip_",
"product": {
"name": "scalance_xb213-3__sc__e_ip_",
"product_id": "CSAFPID-1476148",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__sc__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__sc__e_ip___6gk5213-3bd00-2tb2_",
"product": {
"name": "scalance_xb213-3__sc__e_ip___6gk5213-3bd00-2tb2_",
"product_id": "CSAFPID-1613467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__sc__e_ip___6gk5213-3bd00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__sc__pn_",
"product": {
"name": "scalance_xb213-3__sc__pn_",
"product_id": "CSAFPID-1476149",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__sc__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__sc__pn___6gk5213-3bd00-2ab2_",
"product": {
"name": "scalance_xb213-3__sc__pn___6gk5213-3bd00-2ab2_",
"product_id": "CSAFPID-1613468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__sc__pn___6gk5213-3bd00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__st__e_ip_",
"product": {
"name": "scalance_xb213-3__st__e_ip_",
"product_id": "CSAFPID-1476150",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__st__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__st__e_ip___6gk5213-3bb00-2tb2_",
"product": {
"name": "scalance_xb213-3__st__e_ip___6gk5213-3bb00-2tb2_",
"product_id": "CSAFPID-1613469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__st__e_ip___6gk5213-3bb00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__st__pn_",
"product": {
"name": "scalance_xb213-3__st__pn_",
"product_id": "CSAFPID-1476151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__st__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3__st__pn___6gk5213-3bb00-2ab2_",
"product": {
"name": "scalance_xb213-3__st__pn___6gk5213-3bb00-2ab2_",
"product_id": "CSAFPID-1613470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3__st__pn___6gk5213-3bb00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3ld",
"product": {
"name": "scalance_xb213-3ld",
"product_id": "CSAFPID-1702584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3ld:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3ld__sc__e_ip_",
"product": {
"name": "scalance_xb213-3ld__sc__e_ip_",
"product_id": "CSAFPID-1476152",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3ld__sc__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3ld__sc__e_ip___6gk5213-3bf00-2tb2_",
"product": {
"name": "scalance_xb213-3ld__sc__e_ip___6gk5213-3bf00-2tb2_",
"product_id": "CSAFPID-1613471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3ld__sc__e_ip___6gk5213-3bf00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3ld__sc__pn_",
"product": {
"name": "scalance_xb213-3ld__sc__pn_",
"product_id": "CSAFPID-1476153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3ld__sc__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb213-3ld__sc__pn___6gk5213-3bf00-2ab2_",
"product": {
"name": "scalance_xb213-3ld__sc__pn___6gk5213-3bf00-2ab2_",
"product_id": "CSAFPID-1613472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb213-3ld__sc__pn___6gk5213-3bf00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb216__e_ip_",
"product": {
"name": "scalance_xb216__e_ip_",
"product_id": "CSAFPID-1476154",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb216__e_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb216__e_ip___6gk5216-0ba00-2tb2_",
"product": {
"name": "scalance_xb216__e_ip___6gk5216-0ba00-2tb2_",
"product_id": "CSAFPID-1613473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb216__e_ip___6gk5216-0ba00-2tb2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb216__pn_",
"product": {
"name": "scalance_xb216__pn_",
"product_id": "CSAFPID-1476155",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb216__pn_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xb216__pn___6gk5216-0ba00-2ab2_",
"product": {
"name": "scalance_xb216__pn___6gk5216-0ba00-2ab2_",
"product_id": "CSAFPID-1613474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xb216__pn___6gk5216-0ba00-2ab2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2",
"product": {
"name": "scalance_xc206-2",
"product_id": "CSAFPID-1743018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2__sc_",
"product": {
"name": "scalance_xc206-2__sc_",
"product_id": "CSAFPID-1476156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2__sc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2__sc___6gk5206-2bd00-2ac2_",
"product": {
"name": "scalance_xc206-2__sc___6gk5206-2bd00-2ac2_",
"product_id": "CSAFPID-1613475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2__sc___6gk5206-2bd00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2__st_bfoc_",
"product": {
"name": "scalance_xc206-2__st_bfoc_",
"product_id": "CSAFPID-1476157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2__st_bfoc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2__st_bfoc___6gk5206-2bb00-2ac2_",
"product": {
"name": "scalance_xc206-2__st_bfoc___6gk5206-2bb00-2ac2_",
"product_id": "CSAFPID-1613476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2__st_bfoc___6gk5206-2bb00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe",
"product": {
"name": "scalance_xc206-2g_poe",
"product_id": "CSAFPID-1712777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe",
"product": {
"name": "scalance_xc206-2g_poe",
"product_id": "CSAFPID-1476158",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe__54_v_dc_",
"product": {
"name": "scalance_xc206-2g_poe__54_v_dc_",
"product_id": "CSAFPID-1476159",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe__54_v_dc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe__54_v_dc___6gk5206-2rs00-5ac2_",
"product": {
"name": "scalance_xc206-2g_poe__54_v_dc___6gk5206-2rs00-5ac2_",
"product_id": "CSAFPID-1613478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe__54_v_dc___6gk5206-2rs00-5ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe__6gk5206-2rs00-2ac2_",
"product": {
"name": "scalance_xc206-2g_poe__6gk5206-2rs00-2ac2_",
"product_id": "CSAFPID-1613477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe__6gk5206-2rs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe_eec",
"product": {
"name": "scalance_xc206-2g_poe_eec",
"product_id": "CSAFPID-1743015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe_eec__54_v_dc_",
"product": {
"name": "scalance_xc206-2g_poe_eec__54_v_dc_",
"product_id": "CSAFPID-1476160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe_eec__54_v_dc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2g_poe_eec__54_v_dc___6gk5206-2rs00-5fc2_",
"product": {
"name": "scalance_xc206-2g_poe_eec__54_v_dc___6gk5206-2rs00-5fc2_",
"product_id": "CSAFPID-1613479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2g_poe_eec__54_v_dc___6gk5206-2rs00-5fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp",
"product": {
"name": "scalance_xc206-2sfp",
"product_id": "CSAFPID-1702588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp",
"product": {
"name": "scalance_xc206-2sfp",
"product_id": "CSAFPID-1476161",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp__6gk5206-2bs00-2ac2_",
"product": {
"name": "scalance_xc206-2sfp__6gk5206-2bs00-2ac2_",
"product_id": "CSAFPID-1613480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp__6gk5206-2bs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_eec",
"product": {
"name": "scalance_xc206-2sfp_eec",
"product_id": "CSAFPID-1702589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_eec",
"product": {
"name": "scalance_xc206-2sfp_eec",
"product_id": "CSAFPID-1476162",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_eec__6gk5206-2bs00-2fc2_",
"product": {
"name": "scalance_xc206-2sfp_eec__6gk5206-2bs00-2fc2_",
"product_id": "CSAFPID-1613481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_eec__6gk5206-2bs00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g",
"product": {
"name": "scalance_xc206-2sfp_g",
"product_id": "CSAFPID-1702590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g",
"product": {
"name": "scalance_xc206-2sfp_g",
"product_id": "CSAFPID-1476163",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g__6gk5206-2gs00-2ac2_",
"product": {
"name": "scalance_xc206-2sfp_g__6gk5206-2gs00-2ac2_",
"product_id": "CSAFPID-1613482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g__6gk5206-2gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g__eip_def._",
"product": {
"name": "scalance_xc206-2sfp_g__eip_def._",
"product_id": "CSAFPID-1476164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g__eip_def._:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g__eip_def.___6gk5206-2gs00-2tc2_",
"product": {
"name": "scalance_xc206-2sfp_g__eip_def.___6gk5206-2gs00-2tc2_",
"product_id": "CSAFPID-1613483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g__eip_def.___6gk5206-2gs00-2tc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g_eec",
"product": {
"name": "scalance_xc206-2sfp_g_eec",
"product_id": "CSAFPID-1702591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g_eec",
"product": {
"name": "scalance_xc206-2sfp_g_eec",
"product_id": "CSAFPID-1476165",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc206-2sfp_g_eec__6gk5206-2gs00-2fc2_",
"product": {
"name": "scalance_xc206-2sfp_g_eec__6gk5206-2gs00-2fc2_",
"product_id": "CSAFPID-1613484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc206-2sfp_g_eec__6gk5206-2gs00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208",
"product": {
"name": "scalance_xc208",
"product_id": "CSAFPID-1476166",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208__6gk5208-0ba00-2ac2_",
"product": {
"name": "scalance_xc208__6gk5208-0ba00-2ac2_",
"product_id": "CSAFPID-1613485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208__6gk5208-0ba00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208eec",
"product": {
"name": "scalance_xc208eec",
"product_id": "CSAFPID-1476167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208eec__6gk5208-0ba00-2fc2_",
"product": {
"name": "scalance_xc208eec__6gk5208-0ba00-2fc2_",
"product_id": "CSAFPID-1613486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208eec__6gk5208-0ba00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g",
"product": {
"name": "scalance_xc208g",
"product_id": "CSAFPID-1476168",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g__6gk5208-0ga00-2ac2_",
"product": {
"name": "scalance_xc208g__6gk5208-0ga00-2ac2_",
"product_id": "CSAFPID-1613487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g__6gk5208-0ga00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g__eip_def._",
"product": {
"name": "scalance_xc208g__eip_def._",
"product_id": "CSAFPID-1476169",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g__eip_def._:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g__eip_def.___6gk5208-0ga00-2tc2_",
"product": {
"name": "scalance_xc208g__eip_def.___6gk5208-0ga00-2tc2_",
"product_id": "CSAFPID-1613488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g__eip_def.___6gk5208-0ga00-2tc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_eec",
"product": {
"name": "scalance_xc208g_eec",
"product_id": "CSAFPID-1476170",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_eec__6gk5208-0ga00-2fc2_",
"product": {
"name": "scalance_xc208g_eec__6gk5208-0ga00-2fc2_",
"product_id": "CSAFPID-1613489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_eec__6gk5208-0ga00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_poe",
"product": {
"name": "scalance_xc208g_poe",
"product_id": "CSAFPID-1476171",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_poe:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_poe__54_v_dc_",
"product": {
"name": "scalance_xc208g_poe__54_v_dc_",
"product_id": "CSAFPID-1476172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_poe__54_v_dc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_poe__54_v_dc___6gk5208-0ra00-5ac2_",
"product": {
"name": "scalance_xc208g_poe__54_v_dc___6gk5208-0ra00-5ac2_",
"product_id": "CSAFPID-1613491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_poe__54_v_dc___6gk5208-0ra00-5ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc208g_poe__6gk5208-0ra00-2ac2_",
"product": {
"name": "scalance_xc208g_poe__6gk5208-0ra00-2ac2_",
"product_id": "CSAFPID-1613490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc208g_poe__6gk5208-0ra00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-3g_poe",
"product": {
"name": "scalance_xc216-3g_poe",
"product_id": "CSAFPID-1712784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-3g_poe:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-3g_poe",
"product": {
"name": "scalance_xc216-3g_poe",
"product_id": "CSAFPID-1476174",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-3g_poe:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-3g_poe__54_v_dc_",
"product": {
"name": "scalance_xc216-3g_poe__54_v_dc_",
"product_id": "CSAFPID-1476175",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-3g_poe__54_v_dc_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-3g_poe__54_v_dc___6gk5216-3rs00-5ac2_",
"product": {
"name": "scalance_xc216-3g_poe__54_v_dc___6gk5216-3rs00-5ac2_",
"product_id": "CSAFPID-1613494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-3g_poe__54_v_dc___6gk5216-3rs00-5ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-3g_poe__6gk5216-3rs00-2ac2_",
"product": {
"name": "scalance_xc216-3g_poe__6gk5216-3rs00-2ac2_",
"product_id": "CSAFPID-1613493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-3g_poe__6gk5216-3rs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c",
"product": {
"name": "scalance_xc216-4c",
"product_id": "CSAFPID-1702597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c",
"product": {
"name": "scalance_xc216-4c",
"product_id": "CSAFPID-1476176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c__6gk5216-4bs00-2ac2_",
"product": {
"name": "scalance_xc216-4c__6gk5216-4bs00-2ac2_",
"product_id": "CSAFPID-1613495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c__6gk5216-4bs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g",
"product": {
"name": "scalance_xc216-4c_g",
"product_id": "CSAFPID-1702598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g",
"product": {
"name": "scalance_xc216-4c_g",
"product_id": "CSAFPID-1476177",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g__6gk5216-4gs00-2ac2_",
"product": {
"name": "scalance_xc216-4c_g__6gk5216-4gs00-2ac2_",
"product_id": "CSAFPID-1613496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g__6gk5216-4gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g__eip_def._",
"product": {
"name": "scalance_xc216-4c_g__eip_def._",
"product_id": "CSAFPID-1476178",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g__eip_def._:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g__eip_def.___6gk5216-4gs00-2tc2_",
"product": {
"name": "scalance_xc216-4c_g__eip_def.___6gk5216-4gs00-2tc2_",
"product_id": "CSAFPID-1613497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g__eip_def.___6gk5216-4gs00-2tc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g_eec",
"product": {
"name": "scalance_xc216-4c_g_eec",
"product_id": "CSAFPID-1702600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g_eec",
"product": {
"name": "scalance_xc216-4c_g_eec",
"product_id": "CSAFPID-1476179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216-4c_g_eec__6gk5216-4gs00-2fc2_",
"product": {
"name": "scalance_xc216-4c_g_eec__6gk5216-4gs00-2fc2_",
"product_id": "CSAFPID-1613498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216-4c_g_eec__6gk5216-4gs00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216",
"product": {
"name": "scalance_xc216",
"product_id": "CSAFPID-1476173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216__6gk5216-0ba00-2ac2_",
"product": {
"name": "scalance_xc216__6gk5216-0ba00-2ac2_",
"product_id": "CSAFPID-1613492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216__6gk5216-0ba00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216eec",
"product": {
"name": "scalance_xc216eec",
"product_id": "CSAFPID-1476180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc216eec__6gk5216-0ba00-2fc2_",
"product": {
"name": "scalance_xc216eec__6gk5216-0ba00-2fc2_",
"product_id": "CSAFPID-1613499",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc216eec__6gk5216-0ba00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g",
"product": {
"name": "scalance_xc224-4c_g",
"product_id": "CSAFPID-1702603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g",
"product": {
"name": "scalance_xc224-4c_g",
"product_id": "CSAFPID-1476182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g__6gk5224-4gs00-2ac2_",
"product": {
"name": "scalance_xc224-4c_g__6gk5224-4gs00-2ac2_",
"product_id": "CSAFPID-1613501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g__6gk5224-4gs00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g__eip_def._",
"product": {
"name": "scalance_xc224-4c_g__eip_def._",
"product_id": "CSAFPID-1476183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g__eip_def._:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g__eip_def.___6gk5224-4gs00-2tc2_",
"product": {
"name": "scalance_xc224-4c_g__eip_def.___6gk5224-4gs00-2tc2_",
"product_id": "CSAFPID-1613502",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g__eip_def.___6gk5224-4gs00-2tc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g_eec",
"product": {
"name": "scalance_xc224-4c_g_eec",
"product_id": "CSAFPID-1702605",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g_eec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g_eec",
"product": {
"name": "scalance_xc224-4c_g_eec",
"product_id": "CSAFPID-1476184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224-4c_g_eec__6gk5224-4gs00-2fc2_",
"product": {
"name": "scalance_xc224-4c_g_eec__6gk5224-4gs00-2fc2_",
"product_id": "CSAFPID-1613503",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224-4c_g_eec__6gk5224-4gs00-2fc2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224",
"product": {
"name": "scalance_xc224",
"product_id": "CSAFPID-1476181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xc224__6gk5224-0ba00-2ac2_",
"product": {
"name": "scalance_xc224__6gk5224-0ba00-2ac2_",
"product_id": "CSAFPID-1613500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xc224__6gk5224-0ba00-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product": {
"name": "scalance_xch328__6gk5328-4ts01-2ec2_",
"product_id": "CSAFPID-1613504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xch328__6gk5328-4ts01-2ec2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product": {
"name": "scalance_xcm324__6gk5324-8ts01-2ac2_",
"product_id": "CSAFPID-1613505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm324__6gk5324-8ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product": {
"name": "scalance_xcm328__6gk5328-4ts01-2ac2_",
"product_id": "CSAFPID-1613506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm328__6gk5328-4ts01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product": {
"name": "scalance_xcm332__6gk5332-0ga01-2ac2_",
"product_id": "CSAFPID-1613507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xcm332__6gk5332-0ga01-2ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba",
"product": {
"name": "scalance_xf204-2ba",
"product_id": "CSAFPID-1702607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba",
"product": {
"name": "scalance_xf204-2ba",
"product_id": "CSAFPID-1476187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba__6gk5204-2aa00-2gf2_",
"product": {
"name": "scalance_xf204-2ba__6gk5204-2aa00-2gf2_",
"product_id": "CSAFPID-1613510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba__6gk5204-2aa00-2gf2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba_dna",
"product": {
"name": "scalance_xf204-2ba_dna",
"product_id": "CSAFPID-1702608",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba_dna:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba_dna",
"product": {
"name": "scalance_xf204-2ba_dna",
"product_id": "CSAFPID-1476188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba_dna:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204-2ba_dna__6gk5204-2aa00-2yf2_",
"product": {
"name": "scalance_xf204-2ba_dna__6gk5204-2aa00-2yf2_",
"product_id": "CSAFPID-1613511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204-2ba_dna__6gk5204-2aa00-2yf2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204",
"product": {
"name": "scalance_xf204",
"product_id": "CSAFPID-1476185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204__6gk5204-0ba00-2gf2_",
"product": {
"name": "scalance_xf204__6gk5204-0ba00-2gf2_",
"product_id": "CSAFPID-1613508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204__6gk5204-0ba00-2gf2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204_dna",
"product": {
"name": "scalance_xf204_dna",
"product_id": "CSAFPID-1476186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204_dna:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xf204_dna__6gk5204-0ba00-2yf2_",
"product": {
"name": "scalance_xf204_dna__6gk5204-0ba00-2yf2_",
"product_id": "CSAFPID-1613509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xf204_dna__6gk5204-0ba00-2yf2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm408-4c__6gk5408-4gp00-2am2_",
"product": {
"name": "scalance_xm408-4c__6gk5408-4gp00-2am2_",
"product_id": "CSAFPID-1613512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm408-4c__6gk5408-4gp00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm408-4c__l3_int.___6gk5408-4gq00-2am2_",
"product": {
"name": "scalance_xm408-4c__l3_int.___6gk5408-4gq00-2am2_",
"product_id": "CSAFPID-1613513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm408-4c__l3_int.___6gk5408-4gq00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm408-8c__6gk5408-8gs00-2am2_",
"product": {
"name": "scalance_xm408-8c__6gk5408-8gs00-2am2_",
"product_id": "CSAFPID-1613514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm408-8c__6gk5408-8gs00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm408-8c__l3_int.___6gk5408-8gr00-2am2_",
"product": {
"name": "scalance_xm408-8c__l3_int.___6gk5408-8gr00-2am2_",
"product_id": "CSAFPID-1613515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm408-8c__l3_int.___6gk5408-8gr00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm416-4c__6gk5416-4gs00-2am2_",
"product": {
"name": "scalance_xm416-4c__6gk5416-4gs00-2am2_",
"product_id": "CSAFPID-1613516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm416-4c__6gk5416-4gs00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xm416-4c__l3_int.___6gk5416-4gr00-2am2_",
"product": {
"name": "scalance_xm416-4c__l3_int.___6gk5416-4gr00-2am2_",
"product_id": "CSAFPID-1613517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xm416-4c__l3_int.___6gk5416-4gr00-2am2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208",
"product": {
"name": "scalance_xp208",
"product_id": "CSAFPID-1476189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208__6gk5208-0ha00-2as6_",
"product": {
"name": "scalance_xp208__6gk5208-0ha00-2as6_",
"product_id": "CSAFPID-1613518",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208__6gk5208-0ha00-2as6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208__ethernet_ip_",
"product": {
"name": "scalance_xp208__ethernet_ip_",
"product_id": "CSAFPID-1476190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208__ethernet_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208__ethernet_ip___6gk5208-0ha00-2ts6_",
"product": {
"name": "scalance_xp208__ethernet_ip___6gk5208-0ha00-2ts6_",
"product_id": "CSAFPID-1613519",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208__ethernet_ip___6gk5208-0ha00-2ts6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208eec",
"product": {
"name": "scalance_xp208eec",
"product_id": "CSAFPID-1476191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208eec__6gk5208-0ha00-2es6_",
"product": {
"name": "scalance_xp208eec__6gk5208-0ha00-2es6_",
"product_id": "CSAFPID-1613520",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208eec__6gk5208-0ha00-2es6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208poe_eec",
"product": {
"name": "scalance_xp208poe_eec",
"product_id": "CSAFPID-1476192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208poe_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp208poe_eec__6gk5208-0ua00-5es6_",
"product": {
"name": "scalance_xp208poe_eec__6gk5208-0ua00-5es6_",
"product_id": "CSAFPID-1613521",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp208poe_eec__6gk5208-0ua00-5es6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216",
"product": {
"name": "scalance_xp216",
"product_id": "CSAFPID-1476193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216__6gk5216-0ha00-2as6_",
"product": {
"name": "scalance_xp216__6gk5216-0ha00-2as6_",
"product_id": "CSAFPID-1613522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216__6gk5216-0ha00-2as6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216__ethernet_ip_",
"product": {
"name": "scalance_xp216__ethernet_ip_",
"product_id": "CSAFPID-1476194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216__ethernet_ip_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216__ethernet_ip___6gk5216-0ha00-2ts6_",
"product": {
"name": "scalance_xp216__ethernet_ip___6gk5216-0ha00-2ts6_",
"product_id": "CSAFPID-1613523",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216__ethernet_ip___6gk5216-0ha00-2ts6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216eec",
"product": {
"name": "scalance_xp216eec",
"product_id": "CSAFPID-1476195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216eec__6gk5216-0ha00-2es6_",
"product": {
"name": "scalance_xp216eec__6gk5216-0ha00-2es6_",
"product_id": "CSAFPID-1613524",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216eec__6gk5216-0ha00-2es6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216poe_eec",
"product": {
"name": "scalance_xp216poe_eec",
"product_id": "CSAFPID-1476196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216poe_eec:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xp216poe_eec__6gk5216-0ua00-5es6_",
"product": {
"name": "scalance_xp216poe_eec__6gk5216-0ua00-5es6_",
"product_id": "CSAFPID-1613525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xp216poe_eec__6gk5216-0ua00-5es6_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr324wg__24_x_fe__ac_230v_",
"product": {
"name": "scalance_xr324wg__24_x_fe__ac_230v_",
"product_id": "CSAFPID-1476197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr324wg__24_x_fe__ac_230v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr324wg__24_x_fe__ac_230v___6gk5324-0ba00-3ar3_",
"product": {
"name": "scalance_xr324wg__24_x_fe__ac_230v___6gk5324-0ba00-3ar3_",
"product_id": "CSAFPID-1613562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr324wg__24_x_fe__ac_230v___6gk5324-0ba00-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr324wg__24_x_fe__dc_24v_",
"product": {
"name": "scalance_xr324wg__24_x_fe__dc_24v_",
"product_id": "CSAFPID-1476198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr324wg__24_x_fe__dc_24v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr324wg__24_x_fe__dc_24v___6gk5324-0ba00-2ar3_",
"product": {
"name": "scalance_xr324wg__24_x_fe__dc_24v___6gk5324-0ba00-2ar3_",
"product_id": "CSAFPID-1613563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr324wg__24_x_fe__dc_24v___6gk5324-0ba00-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr326-2c_poe_wg",
"product": {
"name": "scalance_xr326-2c_poe_wg",
"product_id": "CSAFPID-1712788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr326-2c_poe_wg:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr326-2c_poe_wg",
"product": {
"name": "scalance_xr326-2c_poe_wg",
"product_id": "CSAFPID-1476199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr326-2c_poe_wg:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr326-2c_poe_wg__6gk5326-2qs00-3ar3_",
"product": {
"name": "scalance_xr326-2c_poe_wg__6gk5326-2qs00-3ar3_",
"product_id": "CSAFPID-1613564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr326-2c_poe_wg__6gk5326-2qs00-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr326-2c_poe_wg__without_ul_",
"product": {
"name": "scalance_xr326-2c_poe_wg__without_ul_",
"product_id": "CSAFPID-1476200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr326-2c_poe_wg__without_ul_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr326-2c_poe_wg__without_ul___6gk5326-2qs00-3rr3_",
"product": {
"name": "scalance_xr326-2c_poe_wg__without_ul___6gk5326-2qs00-3rr3_",
"product_id": "CSAFPID-1613565",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr326-2c_poe_wg__without_ul___6gk5326-2qs00-3rr3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg",
"product": {
"name": "scalance_xr328-4c_wg",
"product_id": "CSAFPID-1743016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v_",
"product_id": "CSAFPID-1476203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe_4xge_ac230v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3ar3_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3ar3_",
"product_id": "CSAFPID-1613568",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3rr3_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3rr3_",
"product_id": "CSAFPID-1613569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe_4xge_ac230v___6gk5328-4fs00-3rr3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe__4xge__24v_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe__4xge__24v_",
"product_id": "CSAFPID-1476201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe__4xge__24v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe__4xge__24v___6gk5328-4fs00-2ar3_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe__4xge__24v___6gk5328-4fs00-2ar3_",
"product_id": "CSAFPID-1613566",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe__4xge__24v___6gk5328-4fs00-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe__4xge_dc24v_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe__4xge_dc24v_",
"product_id": "CSAFPID-1476202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe__4xge_dc24v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__24xfe__4xge_dc24v___6gk5328-4fs00-2rr3_",
"product": {
"name": "scalance_xr328-4c_wg__24xfe__4xge_dc24v___6gk5328-4fs00-2rr3_",
"product_id": "CSAFPID-1613567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__24xfe__4xge_dc24v___6gk5328-4fs00-2rr3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__28xge__ac_230v_",
"product": {
"name": "scalance_xr328-4c_wg__28xge__ac_230v_",
"product_id": "CSAFPID-1476204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__28xge__ac_230v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__28xge__ac_230v___6gk5328-4ss00-3ar3_",
"product": {
"name": "scalance_xr328-4c_wg__28xge__ac_230v___6gk5328-4ss00-3ar3_",
"product_id": "CSAFPID-1613570",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__28xge__ac_230v___6gk5328-4ss00-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__28xge__dc_24v_",
"product": {
"name": "scalance_xr328-4c_wg__28xge__dc_24v_",
"product_id": "CSAFPID-1476205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__28xge__dc_24v_:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr328-4c_wg__28xge__dc_24v___6gk5328-4ss00-2ar3_",
"product": {
"name": "scalance_xr328-4c_wg__28xge__dc_24v___6gk5328-4ss00-2ar3_",
"product_id": "CSAFPID-1613571",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr328-4c_wg__28xge__dc_24v___6gk5328-4ss00-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__1x230v__6gk5524-8gs00-3ar2_",
"product": {
"name": "scalance_xr524-8c__1x230v__6gk5524-8gs00-3ar2_",
"product_id": "CSAFPID-1613572",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__1x230v__6gk5524-8gs00-3ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__1x230v__l3_int.___6gk5524-8gr00-3ar2_",
"product": {
"name": "scalance_xr524-8c__1x230v__l3_int.___6gk5524-8gr00-3ar2_",
"product_id": "CSAFPID-1613573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__1x230v__l3_int.___6gk5524-8gr00-3ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__24v__6gk5524-8gs00-2ar2_",
"product": {
"name": "scalance_xr524-8c__24v__6gk5524-8gs00-2ar2_",
"product_id": "CSAFPID-1613574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__24v__6gk5524-8gs00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__24v__l3_int.___6gk5524-8gr00-2ar2_",
"product": {
"name": "scalance_xr524-8c__24v__l3_int.___6gk5524-8gr00-2ar2_",
"product_id": "CSAFPID-1613575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__24v__l3_int.___6gk5524-8gr00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__2x230v__6gk5524-8gs00-4ar2_",
"product": {
"name": "scalance_xr524-8c__2x230v__6gk5524-8gs00-4ar2_",
"product_id": "CSAFPID-1613576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__2x230v__6gk5524-8gs00-4ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr524-8c__2x230v__l3_int.___6gk5524-8gr00-4ar2_",
"product": {
"name": "scalance_xr524-8c__2x230v__l3_int.___6gk5524-8gr00-4ar2_",
"product_id": "CSAFPID-1613577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr524-8c__2x230v__l3_int.___6gk5524-8gr00-4ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__1x230v__6gk5526-8gs00-3ar2_",
"product": {
"name": "scalance_xr526-8c__1x230v__6gk5526-8gs00-3ar2_",
"product_id": "CSAFPID-1613578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__1x230v__6gk5526-8gs00-3ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__1x230v__l3_int.___6gk5526-8gr00-3ar2_",
"product": {
"name": "scalance_xr526-8c__1x230v__l3_int.___6gk5526-8gr00-3ar2_",
"product_id": "CSAFPID-1613579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__1x230v__l3_int.___6gk5526-8gr00-3ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__24v__6gk5526-8gs00-2ar2_",
"product": {
"name": "scalance_xr526-8c__24v__6gk5526-8gs00-2ar2_",
"product_id": "CSAFPID-1613580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__24v__6gk5526-8gs00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__24v__l3_int.___6gk5526-8gr00-2ar2_",
"product": {
"name": "scalance_xr526-8c__24v__l3_int.___6gk5526-8gr00-2ar2_",
"product_id": "CSAFPID-1613581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__24v__l3_int.___6gk5526-8gr00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__2x230v__6gk5526-8gs00-4ar2_",
"product": {
"name": "scalance_xr526-8c__2x230v__6gk5526-8gs00-4ar2_",
"product_id": "CSAFPID-1613582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__2x230v__6gk5526-8gs00-4ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr526-8c__2x230v__l3_int.___6gk5526-8gr00-4ar2_",
"product": {
"name": "scalance_xr526-8c__2x230v__l3_int.___6gk5526-8gr00-4ar2_",
"product_id": "CSAFPID-1613583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr526-8c__2x230v__l3_int.___6gk5526-8gr00-4ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr528-6m__2hr2___6gk5528-0aa00-2hr2_",
"product": {
"name": "scalance_xr528-6m__2hr2___6gk5528-0aa00-2hr2_",
"product_id": "CSAFPID-1613586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr528-6m__2hr2___6gk5528-0aa00-2hr2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr528-6m__2hr2__l3_int.___6gk5528-0ar00-2hr2_",
"product": {
"name": "scalance_xr528-6m__2hr2__l3_int.___6gk5528-0ar00-2hr2_",
"product_id": "CSAFPID-1613585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr528-6m__2hr2__l3_int.___6gk5528-0ar00-2hr2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr528-6m__6gk5528-0aa00-2ar2_",
"product": {
"name": "scalance_xr528-6m__6gk5528-0aa00-2ar2_",
"product_id": "CSAFPID-1613584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr528-6m__6gk5528-0aa00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr528-6m__l3_int.___6gk5528-0ar00-2ar2_",
"product": {
"name": "scalance_xr528-6m__l3_int.___6gk5528-0ar00-2ar2_",
"product_id": "CSAFPID-1613587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr528-6m__l3_int.___6gk5528-0ar00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr552-12m__2hr2___6gk5552-0aa00-2hr2_",
"product": {
"name": "scalance_xr552-12m__2hr2___6gk5552-0aa00-2hr2_",
"product_id": "CSAFPID-1613590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr552-12m__2hr2___6gk5552-0aa00-2hr2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr552-12m__2hr2___6gk5552-0ar00-2hr2_",
"product": {
"name": "scalance_xr552-12m__2hr2___6gk5552-0ar00-2hr2_",
"product_id": "CSAFPID-1613591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr552-12m__2hr2___6gk5552-0ar00-2hr2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr552-12m__2hr2__l3_int.___6gk5552-0ar00-2ar2_",
"product": {
"name": "scalance_xr552-12m__2hr2__l3_int.___6gk5552-0ar00-2ar2_",
"product_id": "CSAFPID-1613589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr552-12m__2hr2__l3_int.___6gk5552-0ar00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xr552-12m__6gk5552-0aa00-2ar2_",
"product": {
"name": "scalance_xr552-12m__6gk5552-0aa00-2ar2_",
"product_id": "CSAFPID-1613588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xr552-12m__6gk5552-0aa00-2ar2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product": {
"name": "scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_",
"product_id": "CSAFPID-1613592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrh334__24_v_dc__8xfo__cc___6gk5334-2ts01-2er3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_",
"product_id": "CSAFPID-1613593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__12xfo___6gk5334-3ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product": {
"name": "scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_",
"product_id": "CSAFPID-1613594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__230_v_ac__8xfo___6gk5334-2ts01-3ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_",
"product_id": "CSAFPID-1613595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__12xfo___6gk5334-3ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product": {
"name": "scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_",
"product_id": "CSAFPID-1613596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__24_v_dc__8xfo___6gk5334-2ts01-2ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_",
"product_id": "CSAFPID-1613597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__12xfo___6gk5334-3ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product": {
"name": "scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_",
"product_id": "CSAFPID-1613598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:scalance_xrm334__2x230_v_ac__8xfo___6gk5334-2ts01-4ar3_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siemens_simatic_s7-1500_tm_mfp",
"product": {
"name": "siemens_simatic_s7-1500_tm_mfp",
"product_id": "CSAFPID-1727031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siemens_simatic_s7-1500_tm_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cloud_connect_7_cc712__6gk1411-1ac00_",
"product": {
"name": "simatic_cloud_connect_7_cc712__6gk1411-1ac00_",
"product_id": "CSAFPID-1666800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cloud_connect_7_cc712__6gk1411-1ac00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cloud_connect_7_cc716__6gk1411-5ac00_",
"product": {
"name": "simatic_cloud_connect_7_cc716__6gk1411-5ac00_",
"product_id": "CSAFPID-1666801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cloud_connect_7_cc716__6gk1411-5ac00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1542sp-1__6gk7542-6ux00-0xe0_",
"product": {
"name": "simatic_cp_1542sp-1__6gk7542-6ux00-0xe0_",
"product_id": "CSAFPID-1637823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1542sp-1__6gk7542-6ux00-0xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1542sp-1_irc__6gk7542-6vx00-0xe0_",
"product": {
"name": "simatic_cp_1542sp-1_irc__6gk7542-6vx00-0xe0_",
"product_id": "CSAFPID-1637824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1542sp-1_irc__6gk7542-6vx00-0xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_cp_1543sp-1__6gk7543-6wx00-0xe0_",
"product": {
"name": "simatic_cp_1543sp-1__6gk7543-6wx00-0xe0_",
"product_id": "CSAFPID-1637825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_cp_1543sp-1__6gk7543-6wx00-0xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf",
"product_id": "CSAFPID-1666469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf",
"product_id": "CSAFPID-1760820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf",
"product_id": "CSAFPID-1760897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_",
"product": {
"name": "simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_",
"product_id": "CSAFPID-1666662",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1504d_tf__6es7615-4df10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf",
"product_id": "CSAFPID-1666470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf",
"product_id": "CSAFPID-1760821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf",
"product_id": "CSAFPID-1760898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_",
"product": {
"name": "simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_",
"product_id": "CSAFPID-1666663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_drive_controller_cpu_1507d_tf__6es7615-7df10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im154-8_pn_dp_cpu__6es7154-8ab01-0ab0_",
"product": {
"name": "simatic_et_200pro_im154-8_pn_dp_cpu__6es7154-8ab01-0ab0_",
"product_id": "CSAFPID-1701892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im154-8_pn_dp_cpu__6es7154-8ab01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_",
"product": {
"name": "simatic_et_200pro_im154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_",
"product_id": "CSAFPID-1701893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_",
"product": {
"name": "simatic_et_200pro_im154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_",
"product_id": "CSAFPID-1701894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im_154-8_pn_dp_cpu__6es7154-8ab01-0ab0_",
"product": {
"name": "simatic_et_200pro_im_154-8_pn_dp_cpu__6es7154-8ab01-0ab0_",
"product_id": "CSAFPID-1637763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im_154-8_pn_dp_cpu__6es7154-8ab01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im_154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_",
"product": {
"name": "simatic_et_200pro_im_154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_",
"product_id": "CSAFPID-1637764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im_154-8f_pn_dp_cpu__6es7154-8fb01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200pro_im_154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_",
"product": {
"name": "simatic_et_200pro_im_154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_",
"product_id": "CSAFPID-1637765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200pro_im_154-8fx_pn_dp_cpu__6es7154-8fx00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200s_im151-8_pn_dp_cpu__6es7151-8ab01-0ab0_",
"product": {
"name": "simatic_et_200s_im151-8_pn_dp_cpu__6es7151-8ab01-0ab0_",
"product_id": "CSAFPID-1701895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200s_im151-8_pn_dp_cpu__6es7151-8ab01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200s_im151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_",
"product": {
"name": "simatic_et_200s_im151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_",
"product_id": "CSAFPID-1701896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200s_im151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200s_im_151-8_pn_dp_cpu__6es7151-8ab01-0ab0_",
"product": {
"name": "simatic_et_200s_im_151-8_pn_dp_cpu__6es7151-8ab01-0ab0_",
"product_id": "CSAFPID-1637766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200s_im_151-8_pn_dp_cpu__6es7151-8ab01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200s_im_151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_",
"product": {
"name": "simatic_et_200s_im_151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_",
"product_id": "CSAFPID-1637767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200s_im_151-8f_pn_dp_cpu__6es7151-8fb01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller",
"product": {
"name": "simatic_et_200sp_open_controller",
"product_id": "CSAFPID-1737297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_",
"product_id": "CSAFPID-1666664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2__incl._siplus_variants_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants",
"product_id": "CSAFPID-1760822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants",
"product": {
"name": "simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants",
"product_id": "CSAFPID-1760899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2_incl._siplus_variants:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_ipc_diagbase",
"product": {
"name": "simatic_ipc_diagbase",
"product_id": "CSAFPID-1637619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_ipc_diagbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_ipc_diagmonitor",
"product": {
"name": "simatic_ipc_diagmonitor",
"product_id": "CSAFPID-744729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_ipc_diagmonitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_logon",
"product": {
"name": "simatic_logon",
"product_id": "CSAFPID-110325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_logon:1.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_logon",
"product": {
"name": "simatic_logon",
"product_id": "CSAFPID-1744014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_logon:16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_logon_v1.6",
"product": {
"name": "simatic_logon_v1.6",
"product_id": "CSAFPID-1703087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_logon_v1.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv500_family",
"product": {
"name": "simatic_mv500_family",
"product_id": "CSAFPID-1703073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv500_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv540_h__6gf3540-0ge10_",
"product": {
"name": "simatic_mv540_h__6gf3540-0ge10_",
"product_id": "CSAFPID-1702773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv540_h__6gf3540-0ge10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv540_s__6gf3540-0cd10_",
"product": {
"name": "simatic_mv540_s__6gf3540-0cd10_",
"product_id": "CSAFPID-1702774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv540_s__6gf3540-0cd10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv550_h__6gf3550-0ge10_",
"product": {
"name": "simatic_mv550_h__6gf3550-0ge10_",
"product_id": "CSAFPID-1702775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv550_h__6gf3550-0ge10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv550_s__6gf3550-0cd10_",
"product": {
"name": "simatic_mv550_s__6gf3550-0cd10_",
"product_id": "CSAFPID-1702776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv550_s__6gf3550-0cd10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv560_u__6gf3560-0le10_",
"product": {
"name": "simatic_mv560_u__6gf3560-0le10_",
"product_id": "CSAFPID-1702777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv560_u__6gf3560-0le10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_mv560_x__6gf3560-0he10_",
"product": {
"name": "simatic_mv560_x__6gf3560-0he10_",
"product_id": "CSAFPID-1702778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_mv560_x__6gf3560-0he10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_neo_v4.0",
"product": {
"name": "simatic_pcs_neo_v4.0",
"product_id": "CSAFPID-1637615",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_neo_v4.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_neo_v4.1",
"product": {
"name": "simatic_pcs_neo_v4.1",
"product_id": "CSAFPID-1637616",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_neo_v4.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pcs_neo_v5.0",
"product": {
"name": "simatic_pcs_neo_v5.0",
"product_id": "CSAFPID-1637617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pcs_neo_v5.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm",
"product": {
"name": "simatic_pdm",
"product_id": "CSAFPID-714851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm",
"product": {
"name": "simatic_pdm",
"product_id": "CSAFPID-1692756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm:9.2:sp2_upd1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm",
"product": {
"name": "simatic_pdm",
"product_id": "CSAFPID-1744018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm:91:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.1",
"product": {
"name": "simatic_pdm_v9.1",
"product_id": "CSAFPID-1703088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.1:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_pdm_v9.2",
"product": {
"name": "simatic_pdm_v9.2",
"product_id": "CSAFPID-1637912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_pdm_v9.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian",
"product": {
"name": "simatic_process_historian",
"product_id": "CSAFPID-517577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian:2019:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian",
"product": {
"name": "simatic_process_historian",
"product_id": "CSAFPID-1644260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian:2020:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian",
"product": {
"name": "simatic_process_historian",
"product_id": "CSAFPID-1692605",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian:2022:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian_2019_opc_ua_server",
"product": {
"name": "simatic_process_historian_2019_opc_ua_server",
"product_id": "CSAFPID-1703089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian_2019_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian_2020_opc_ua_server",
"product": {
"name": "simatic_process_historian_2020_opc_ua_server",
"product_id": "CSAFPID-1637852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian_2020_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_process_historian_2022_opc_ua_server",
"product": {
"name": "simatic_process_historian_2022_opc_ua_server",
"product_id": "CSAFPID-1637853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_process_historian_2022_opc_ua_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager",
"product": {
"name": "simatic_rtls_locating_manager",
"product_id": "CSAFPID-1691398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager:3.0.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da00_",
"product_id": "CSAFPID-1703180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da00_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da10_",
"product_id": "CSAFPID-1703181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da20_",
"product_id": "CSAFPID-1703182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-0da30_",
"product_id": "CSAFPID-1703183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-0da30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea10_",
"product_id": "CSAFPID-1703184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea10_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea20_",
"product_id": "CSAFPID-1703185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea20_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product": {
"name": "simatic_rtls_locating_manager__6gt2780-1ea30_",
"product_id": "CSAFPID-1703186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_rtls_locating_manager__6gt2780-1ea30_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1760823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1760900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1760977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761107",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac",
"product_id": "CSAFPID-1761133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly",
"product_id": "CSAFPID-1712848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_",
"product_id": "CSAFPID-1666805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_ac_dc_rly__6es7211-1be40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1760824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1760901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1760978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761030",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761108",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc",
"product_id": "CSAFPID-1761134",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc",
"product_id": "CSAFPID-1712849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_",
"product_id": "CSAFPID-1666806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_dc__6es7211-1ae40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly",
"product_id": "CSAFPID-1712850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_",
"product_id": "CSAFPID-1666807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1211c_dc_dc_rly__6es7211-1he40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1760825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1760902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1760979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761109",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac",
"product_id": "CSAFPID-1761135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly",
"product_id": "CSAFPID-1712851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_",
"product_id": "CSAFPID-1666808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_ac_dc_rly__6es7212-1be40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760903",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761032",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761058",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc",
"product_id": "CSAFPID-1712852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_",
"product_id": "CSAFPID-1666809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_dc__6es7212-1ae40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly",
"product_id": "CSAFPID-1712853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_",
"product_id": "CSAFPID-1666810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212c_dc_dc_rly__6es7212-1he40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1760827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1760904",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1760981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761059",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc",
"product_id": "CSAFPID-1761137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc",
"product_id": "CSAFPID-1712854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_",
"product_id": "CSAFPID-1666811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_dc__6es7212-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly",
"product_id": "CSAFPID-1712855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_",
"product_id": "CSAFPID-1666812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1212fc_dc_dc_rly__6es7212-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1760828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1760905",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1760982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761008",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac",
"product_id": "CSAFPID-1761138",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly",
"product_id": "CSAFPID-1712856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_",
"product_id": "CSAFPID-1666813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_ac_dc_rly__6es7214-1bg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761009",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761139",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc",
"product_id": "CSAFPID-1712857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_",
"product_id": "CSAFPID-1666814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_dc__6es7214-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly",
"product_id": "CSAFPID-1712858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_",
"product_id": "CSAFPID-1666815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214c_dc_dc_rly__6es7214-1hg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761010",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761140",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc",
"product_id": "CSAFPID-1712859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_",
"product_id": "CSAFPID-1666816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_dc__6es7214-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly",
"product_id": "CSAFPID-1712860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_",
"product_id": "CSAFPID-1666817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1214fc_dc_dc_rly__6es7214-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1760831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1760908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1760985",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761011",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761037",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac",
"product_id": "CSAFPID-1761141",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly",
"product_id": "CSAFPID-1712861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_",
"product_id": "CSAFPID-1666818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_ac_dc_rly__6es7215-1bg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760986",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761142",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc",
"product_id": "CSAFPID-1712862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_",
"product_id": "CSAFPID-1666819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_dc__6es7215-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly",
"product_id": "CSAFPID-1712863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_",
"product_id": "CSAFPID-1666820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215c_dc_dc_rly__6es7215-1hg40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760987",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761117",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761143",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc",
"product_id": "CSAFPID-1712864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_",
"product_id": "CSAFPID-1666821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_dc__6es7215-1af40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly",
"product_id": "CSAFPID-1712865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_",
"product_id": "CSAFPID-1666822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1215fc_dc_dc_rly__6es7215-1hf40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1760834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1760911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1760988",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761040",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc",
"product_id": "CSAFPID-1761144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc",
"product_id": "CSAFPID-1712866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_",
"product": {
"name": "simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_",
"product_id": "CSAFPID-1666823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_1217c_dc_dc_dc__6es7217-1ag40-0xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_family",
"product": {
"name": "simatic_s7-1200_cpu_family",
"product_id": "CSAFPID-1737291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_family:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1200_cpu_family__incl._siplus_variants_",
"product": {
"name": "simatic_s7-1200_cpu_family__incl._siplus_variants_",
"product_id": "CSAFPID-1637703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1200_cpu_family__incl._siplus_variants_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1666484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1760835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1760912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj00-0ab0_",
"product_id": "CSAFPID-1703018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_",
"product_id": "CSAFPID-1666667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dj01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_",
"product_id": "CSAFPID-1666668",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp-1_pn__6es7510-1dk03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1666485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1760836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn",
"product_id": "CSAFPID-1760913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj00-0ab0_",
"product_id": "CSAFPID-1703017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_",
"product_id": "CSAFPID-1666665",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sj01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_",
"product_id": "CSAFPID-1666666",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1510sp_f-1_pn__6es7510-1sk03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1666486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1760837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn",
"product_id": "CSAFPID-1760914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak00-0ab0_",
"product_id": "CSAFPID-1703019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_",
"product_id": "CSAFPID-1666669",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_",
"product_id": "CSAFPID-1666670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1ak02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_",
"product_id": "CSAFPID-1666671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511-1_pn__6es7511-1al03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product_id": "CSAFPID-1666487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product_id": "CSAFPID-1760838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn",
"product_id": "CSAFPID-1760915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_",
"product_id": "CSAFPID-1666672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_",
"product_id": "CSAFPID-1666673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1ck01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_",
"product_id": "CSAFPID-1666674",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511c-1_pn__6es7511-1cl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1666488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1760839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn",
"product_id": "CSAFPID-1760916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk00-0ab0_",
"product_id": "CSAFPID-1703020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_",
"product_id": "CSAFPID-1666675",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_",
"product_id": "CSAFPID-1666676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fk02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_",
"product_id": "CSAFPID-1666677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511f-1_pn__6es7511-1fl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product_id": "CSAFPID-1666489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product_id": "CSAFPID-1760840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn",
"product_id": "CSAFPID-1760917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_",
"product_id": "CSAFPID-1666678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_",
"product_id": "CSAFPID-1666679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511t-1_pn__6es7511-1tl03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1666490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1760841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn",
"product_id": "CSAFPID-1760918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_",
"product_id": "CSAFPID-1666680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1uk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_",
"product_id": "CSAFPID-1666681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1511tf-1_pn__6es7511-1ul03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product_id": "CSAFPID-1666491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product_id": "CSAFPID-1760842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn",
"product_id": "CSAFPID-1760919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_",
"product_id": "CSAFPID-1666682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_",
"product_id": "CSAFPID-1666683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1ck01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_",
"product_id": "CSAFPID-1666684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512c-1_pn__6es7512-1cm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1666492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1760843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1760920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk00-0ab0_",
"product_id": "CSAFPID-1703022",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_",
"product_id": "CSAFPID-1666687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_",
"product_id": "CSAFPID-1666688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp-1_pn__6es7512-1dm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1666493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1760844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1760921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk00-0ab0_",
"product_id": "CSAFPID-1703021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_",
"product_id": "CSAFPID-1666685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sk01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_",
"product_id": "CSAFPID-1666686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1512sp_f-1_pn__6es7512-1sm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1666494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1760845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn",
"product_id": "CSAFPID-1760922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al00-0ab0_",
"product_id": "CSAFPID-1703023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1al00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_",
"product_id": "CSAFPID-1666689",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1al01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_",
"product_id": "CSAFPID-1666690",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1al02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_",
"product_id": "CSAFPID-1666691",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513-1_pn__6es7513-1am03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1666495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1760846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1760923",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl00-0ab0_",
"product_id": "CSAFPID-1703024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_",
"product_id": "CSAFPID-1666692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_",
"product_id": "CSAFPID-1666693",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fl02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_",
"product_id": "CSAFPID-1666694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513f-1_pn__6es7513-1fm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1666496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1760847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn",
"product_id": "CSAFPID-1760924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_",
"product_id": "CSAFPID-1666696",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro-2_pn__6es7513-2pm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1666497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1760848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn",
"product_id": "CSAFPID-1760925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_",
"product_id": "CSAFPID-1666695",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513pro_f-2_pn__6es7513-2gm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product_id": "CSAFPID-1737266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513r-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product_id": "CSAFPID-1760849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513r-1_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product": {
"name": "simatic_s7-1500_cpu_1513r-1_pn",
"product_id": "CSAFPID-1760926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513r-1_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rl00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rl00-0ab0_",
"product_id": "CSAFPID-1702989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rm03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rm03-0ab0_",
"product_id": "CSAFPID-1703090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1513r-1_pn__6es7513-1rm03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1666498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1760850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn",
"product_id": "CSAFPID-1760927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_",
"product_id": "CSAFPID-1666698",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp-2_pn__6es7514-2dn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product_id": "CSAFPID-1666499",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product_id": "CSAFPID-1760851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn",
"product_id": "CSAFPID-1760928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_",
"product_id": "CSAFPID-1666697",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514sp_f-2_pn__6es7514-2sn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1666500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1760852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn",
"product_id": "CSAFPID-1760929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_",
"product_id": "CSAFPID-1666700",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt-2_pn__6es7514-2vn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1666501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1760853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn",
"product_id": "CSAFPID-1760930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_",
"product_id": "CSAFPID-1666699",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1514spt_f-2_pn__6es7514-2wn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1666502",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1760854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn",
"product_id": "CSAFPID-1760931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am00-0ab0_",
"product_id": "CSAFPID-1703025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2am00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_",
"product_id": "CSAFPID-1666701",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2am01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_",
"product_id": "CSAFPID-1666702",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2am02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_",
"product_id": "CSAFPID-1666703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515-2_pn__6es7515-2an03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1666503",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1760855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1760932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm00-0ab0_",
"product_id": "CSAFPID-1703026",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_",
"product_id": "CSAFPID-1666704",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_",
"product_id": "CSAFPID-1666705",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fm02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_",
"product_id": "CSAFPID-1666706",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515f-2_pn__6es7515-2fn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product_id": "CSAFPID-1749304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515r-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product_id": "CSAFPID-1760856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515r-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515r-2_pn",
"product_id": "CSAFPID-1760933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515r-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rm00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rm00-0ab0_",
"product_id": "CSAFPID-1702990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rm00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rn03-0ab0_",
"product_id": "CSAFPID-1703091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515r-2_pn__6es7515-2rn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product_id": "CSAFPID-1666504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product_id": "CSAFPID-1760857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn",
"product_id": "CSAFPID-1760934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_",
"product_id": "CSAFPID-1666707",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tm01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_",
"product_id": "CSAFPID-1666708",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515t-2_pn__6es7515-2tn03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product_id": "CSAFPID-1666505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product_id": "CSAFPID-1760858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn",
"product_id": "CSAFPID-1760935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_",
"product_id": "CSAFPID-1666709",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2um01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_",
"product_id": "CSAFPID-1666710",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1515tf-2_pn__6es7515-2un03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product_id": "CSAFPID-1760859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn",
"product_id": "CSAFPID-1760936",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp",
"product_id": "CSAFPID-1712867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an00-0ab0_",
"product_id": "CSAFPID-1703027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_",
"product_id": "CSAFPID-1666711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_",
"product_id": "CSAFPID-1666712",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3an02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_",
"product_id": "CSAFPID-1666713",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516-3_pn_dp__6es7516-3ap03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product_id": "CSAFPID-1760860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn",
"product_id": "CSAFPID-1760937",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp",
"product_id": "CSAFPID-1712868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn00-0ab0_",
"product_id": "CSAFPID-1703028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_",
"product_id": "CSAFPID-1666714",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_",
"product_id": "CSAFPID-1666715",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fn02-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_",
"product_id": "CSAFPID-1666716",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516f-3_pn_dp__6es7516-3fp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1666508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1760861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn",
"product_id": "CSAFPID-1760938",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_",
"product_id": "CSAFPID-1666718",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro-2_pn__6es7516-2pp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1666509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1760862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn",
"product_id": "CSAFPID-1760939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_",
"product_id": "CSAFPID-1666717",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516pro_f-2_pn__6es7516-2gp03-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product_id": "CSAFPID-1760863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn",
"product_id": "CSAFPID-1760940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp",
"product_id": "CSAFPID-1712869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_",
"product_id": "CSAFPID-1666719",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516t-3_pn_dp__6es7516-3tn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product_id": "CSAFPID-1760864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn",
"product_id": "CSAFPID-1760941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp",
"product_id": "CSAFPID-1712870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_",
"product_id": "CSAFPID-1666720",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1516tf-3_pn_dp__6es7516-3un00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product_id": "CSAFPID-1760865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn",
"product_id": "CSAFPID-1760942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn_dp",
"product_id": "CSAFPID-1712871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_",
"product_id": "CSAFPID-1666721",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517-3_pn_dp__6es7517-3ap00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product_id": "CSAFPID-1760866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn",
"product_id": "CSAFPID-1760943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp",
"product_id": "CSAFPID-1712872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_",
"product_id": "CSAFPID-1666722",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_",
"product_id": "CSAFPID-1666723",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517f-3_pn_dp__6es7517-3fp01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1749305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517h-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1760867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517h-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1760944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517h-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517h-3_pn__6es7517-3hp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517h-3_pn__6es7517-3hp00-0ab0_",
"product_id": "CSAFPID-1702991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517h-3_pn__6es7517-3hp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product_id": "CSAFPID-1760868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn",
"product_id": "CSAFPID-1760945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp",
"product_id": "CSAFPID-1712873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_",
"product_id": "CSAFPID-1666724",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517t-3_pn_dp__6es7517-3tp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product_id": "CSAFPID-1760869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn",
"product_id": "CSAFPID-1760946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp",
"product_id": "CSAFPID-1712874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_",
"product_id": "CSAFPID-1666725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1517tf-3_pn_dp__6es7517-3up00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1760870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1760947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp",
"product_id": "CSAFPID-1712875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_",
"product_id": "CSAFPID-1666726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp__6es7518-4ap00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp",
"product_id": "CSAFPID-1712876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_",
"product_id": "CSAFPID-1615260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_",
"product_id": "CSAFPID-1615261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518-4_pn_dp_mfp__6es7518-4ax00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1760871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1760948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp",
"product_id": "CSAFPID-1712877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_",
"product_id": "CSAFPID-1666727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp__6es7518-4fp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp",
"product_id": "CSAFPID-1702492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_",
"product_id": "CSAFPID-1615262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product": {
"name": "simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_",
"product_id": "CSAFPID-1615263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518f-4_pn_dp_mfp__6es7518-4fx00-1ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1737300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518hf-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1760872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518hf-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1760949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518hf-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518hf-4_pn__6es7518-4jp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518hf-4_pn__6es7518-4jp00-0ab0_",
"product_id": "CSAFPID-1702992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518hf-4_pn__6es7518-4jp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product_id": "CSAFPID-1760873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn",
"product_id": "CSAFPID-1760950",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp",
"product_id": "CSAFPID-1712878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_",
"product_id": "CSAFPID-1666728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518t-4_pn_dp__6es7518-4tp00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product_id": "CSAFPID-1760874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn",
"product_id": "CSAFPID-1760951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp",
"product_id": "CSAFPID-1712879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_",
"product": {
"name": "simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_",
"product_id": "CSAFPID-1666729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_1518tf-4_pn_dp__6es7518-4up00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_",
"product_id": "CSAFPID-1666730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518-4_pn_dp_odk__6es7518-4ap00-3ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_",
"product": {
"name": "simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_",
"product_id": "CSAFPID-1666731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_cpu_s7-1518f-4_pn_dp_odk__6es7518-4fp00-3ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_",
"product_id": "CSAFPID-1666733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro-2_pn__6es7513-2pl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_",
"product_id": "CSAFPID-1666732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1513pro_f-2_pn__6es7513-2gl00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_",
"product_id": "CSAFPID-1666735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro-2_pn__6es7516-2pn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_",
"product": {
"name": "simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_",
"product_id": "CSAFPID-1666734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_et_200pro__cpu_1516pro_f-2_pn__6es7516-2gn00-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller",
"product": {
"name": "simatic_s7-1500_software_controller",
"product_id": "CSAFPID-722125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller",
"product": {
"name": "simatic_s7-1500_software_controller",
"product_id": "CSAFPID-1760875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller",
"product": {
"name": "simatic_s7-1500_software_controller",
"product_id": "CSAFPID-1760952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v2",
"product": {
"name": "simatic_s7-1500_software_controller_v2",
"product_id": "CSAFPID-1666555",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_software_controller_v3",
"product": {
"name": "simatic_s7-1500_software_controller_v3",
"product_id": "CSAFPID-1666556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller_v3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_bios",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_bios",
"product_id": "CSAFPID-1703132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_bios:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product": {
"name": "simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem",
"product_id": "CSAFPID-1703131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-1500_tm_mfp_-_gnu_linux_subsystem:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_314c-2_pn_dp__6es7314-6eh04-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_314c-2_pn_dp__6es7314-6eh04-0ab0_",
"product_id": "CSAFPID-1637770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_314c-2_pn_dp__6es7314-6eh04-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_315-2_pn_dp__6es7315-2eh14-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_315-2_pn_dp__6es7315-2eh14-0ab0_",
"product_id": "CSAFPID-1637771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_315-2_pn_dp__6es7315-2eh14-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_315f-2_pn_dp__6es7315-2fj14-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_315f-2_pn_dp__6es7315-2fj14-0ab0_",
"product_id": "CSAFPID-1637772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_315f-2_pn_dp__6es7315-2fj14-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_315t-3_pn_dp__6es7315-7tj10-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_315t-3_pn_dp__6es7315-7tj10-0ab0_",
"product_id": "CSAFPID-1637773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_315t-3_pn_dp__6es7315-7tj10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_317-2_pn_dp__6es7317-2ek14-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_317-2_pn_dp__6es7317-2ek14-0ab0_",
"product_id": "CSAFPID-1637774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_317-2_pn_dp__6es7317-2ek14-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_317f-2_pn_dp__6es7317-2fk14-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_317f-2_pn_dp__6es7317-2fk14-0ab0_",
"product_id": "CSAFPID-1637775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_317f-2_pn_dp__6es7317-2fk14-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_317t-3_pn_dp__6es7317-7tk10-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_317t-3_pn_dp__6es7317-7tk10-0ab0_",
"product_id": "CSAFPID-1637776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_317t-3_pn_dp__6es7317-7tk10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_317tf-3_pn_dp__6es7317-7ul10-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_317tf-3_pn_dp__6es7317-7ul10-0ab0_",
"product_id": "CSAFPID-1637777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_317tf-3_pn_dp__6es7317-7ul10-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_319-3_pn_dp__6es7318-3el01-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_319-3_pn_dp__6es7318-3el01-0ab0_",
"product_id": "CSAFPID-1637778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_319-3_pn_dp__6es7318-3el01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-300_cpu_319f-3_pn_dp__6es7318-3fl01-0ab0_",
"product": {
"name": "simatic_s7-300_cpu_319f-3_pn_dp__6es7318-3fl01-0ab0_",
"product_id": "CSAFPID-1637779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-300_cpu_319f-3_pn_dp__6es7318-3fl01-0ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_advanced",
"product": {
"name": "simatic_s7-plcsim_advanced",
"product_id": "CSAFPID-710676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_advanced",
"product": {
"name": "simatic_s7-plcsim_advanced",
"product_id": "CSAFPID-1760876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7-plcsim_advanced",
"product": {
"name": "simatic_s7-plcsim_advanced",
"product_id": "CSAFPID-1760953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simatic_s7",
"product": {
"name": "simatic_s7",
"product_id": "CSAFPID-1751507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simatic_s7:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "simocode_es_v19",
"product": {
"name": "simocode_es_v19",
"product_id": "CSAFPID-1741179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:simocode_es_v19:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-746925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_ins",
"product": {
"name": "sinec_ins",
"product_id": "CSAFPID-1720320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_ins:1.0_sp2_update_3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_network_management_system",
"product": {
"name": "sinec_network_management_system",
"product_id": "CSAFPID-1691397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_network_management_system:2.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-309392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1693062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:2.0:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sinec_nms",
"product": {
"name": "sinec_nms",
"product_id": "CSAFPID-1722281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:sinec_nms:3.0:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200s_im151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_",
"product": {
"name": "siplus_et_200s_im151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_",
"product_id": "CSAFPID-1701897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200s_im151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200s_im151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_",
"product": {
"name": "siplus_et_200s_im151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_",
"product_id": "CSAFPID-1701898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200s_im151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200s_im_151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_",
"product": {
"name": "siplus_et_200s_im_151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_",
"product_id": "CSAFPID-1637800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200s_im_151-8_pn_dp_cpu__6ag1151-8ab01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200s_im_151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_",
"product": {
"name": "siplus_et_200s_im_151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_",
"product_id": "CSAFPID-1637801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200s_im_151-8f_pn_dp_cpu__6ag1151-8fb01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cp_1542sp-1_irc_tx_rail__6ag2542-6vx00-4xe0_",
"product": {
"name": "siplus_et_200sp_cp_1542sp-1_irc_tx_rail__6ag2542-6vx00-4xe0_",
"product_id": "CSAFPID-1637829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cp_1542sp-1_irc_tx_rail__6ag2542-6vx00-4xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cp_1543sp-1_isec__6ag1543-6wx00-7xe0_",
"product": {
"name": "siplus_et_200sp_cp_1543sp-1_isec__6ag1543-6wx00-7xe0_",
"product_id": "CSAFPID-1637830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cp_1543sp-1_isec__6ag1543-6wx00-7xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cp_1543sp-1_isec_tx_rail__6ag2543-6wx00-4xe0_",
"product": {
"name": "siplus_et_200sp_cp_1543sp-1_isec_tx_rail__6ag2543-6wx00-4xe0_",
"product_id": "CSAFPID-1637831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cp_1543sp-1_isec_tx_rail__6ag2543-6wx00-4xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn",
"product_id": "CSAFPID-1666557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_",
"product_id": "CSAFPID-1666738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_",
"product_id": "CSAFPID-1666739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn__6ag1510-1dj01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail",
"product_id": "CSAFPID-1666558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_",
"product_id": "CSAFPID-1666740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_",
"product_id": "CSAFPID-1666741",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp-1_pn_rail__6ag2510-1dj01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_",
"product_id": "CSAFPID-1666736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn__6ag1510-1sj01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail",
"product_id": "CSAFPID-1666560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_",
"product_id": "CSAFPID-1666737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1510sp_f-1_pn_rail__6ag2510-1sj01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn",
"product_id": "CSAFPID-1666561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_",
"product_id": "CSAFPID-1666746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_",
"product_id": "CSAFPID-1666747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn__6ag1512-1dk01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail",
"product_id": "CSAFPID-1666562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_",
"product_id": "CSAFPID-1666748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_",
"product_id": "CSAFPID-1666749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail__6ag2512-1dk01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn",
"product_id": "CSAFPID-1666563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk00-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk00-2ab0_",
"product_id": "CSAFPID-1703029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_",
"product_id": "CSAFPID-1666742",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_",
"product_id": "CSAFPID-1666743",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn__6ag1512-1sk01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail",
"product_id": "CSAFPID-1666564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_",
"product_id": "CSAFPID-1666744",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_",
"product": {
"name": "siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_",
"product_id": "CSAFPID-1666745",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_et_200sp_cpu_1512sp_f-1_pn_rail__6ag2512-1sk01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2",
"product": {
"name": "siplus_net_scalance_xc206-2",
"product_id": "CSAFPID-1702622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2",
"product": {
"name": "siplus_net_scalance_xc206-2",
"product_id": "CSAFPID-1476206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2__6ag1206-2bb00-7ac2_",
"product": {
"name": "siplus_net_scalance_xc206-2__6ag1206-2bb00-7ac2_",
"product_id": "CSAFPID-1613600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2__6ag1206-2bb00-7ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2sfp",
"product": {
"name": "siplus_net_scalance_xc206-2sfp",
"product_id": "CSAFPID-1702623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2sfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2sfp",
"product": {
"name": "siplus_net_scalance_xc206-2sfp",
"product_id": "CSAFPID-1476207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2sfp:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc206-2sfp__6ag1206-2bs00-7ac2_",
"product": {
"name": "siplus_net_scalance_xc206-2sfp__6ag1206-2bs00-7ac2_",
"product_id": "CSAFPID-1613601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc206-2sfp__6ag1206-2bs00-7ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc208",
"product": {
"name": "siplus_net_scalance_xc208",
"product_id": "CSAFPID-1476208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc208:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc208__6ag1208-0ba00-7ac2_",
"product": {
"name": "siplus_net_scalance_xc208__6ag1208-0ba00-7ac2_",
"product_id": "CSAFPID-1613602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc208__6ag1208-0ba00-7ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc216-4c",
"product": {
"name": "siplus_net_scalance_xc216-4c",
"product_id": "CSAFPID-1702625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc216-4c:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc216-4c",
"product": {
"name": "siplus_net_scalance_xc216-4c",
"product_id": "CSAFPID-1476209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc216-4c:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_net_scalance_xc216-4c__6ag1216-4bs00-7ac2_",
"product": {
"name": "siplus_net_scalance_xc216-4c__6ag1216-4bs00-7ac2_",
"product_id": "CSAFPID-1613603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_net_scalance_xc216-4c__6ag1216-4bs00-7ac2_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1760877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1760954",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1760989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac",
"product_id": "CSAFPID-1761145",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly",
"product_id": "CSAFPID-1712886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-2xb0_",
"product_id": "CSAFPID-1713537",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-4xb0_",
"product_id": "CSAFPID-1713538",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_ac_dc_rly__6ag1212-1be40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1760878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1760955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1760990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761042",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc",
"product_id": "CSAFPID-1761146",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly",
"product_id": "CSAFPID-1712887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-2xb0_",
"product_id": "CSAFPID-1713539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-4xb0_",
"product_id": "CSAFPID-1713540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212_dc_dc_rly__6ag1212-1he40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1760991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761043",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761095",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc",
"product_id": "CSAFPID-1761147",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc",
"product_id": "CSAFPID-1712888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-2xb0_",
"product_id": "CSAFPID-1713541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-4xb0_",
"product_id": "CSAFPID-1713542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc_dc_dc__6ag1212-1ae40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc_rail",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc_rail",
"product_id": "CSAFPID-1712889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc_dc_dc_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc_rail__6ag2212-1ae40-1xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1212c_dc_dc_dc_rail__6ag2212-1ae40-1xb0_",
"product_id": "CSAFPID-1713543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1212c_dc_dc_dc_rail__6ag2212-1ae40-1xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1760880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1760957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1760992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761122",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac",
"product_id": "CSAFPID-1761148",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly",
"product_id": "CSAFPID-1712890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-2xb0_",
"product_id": "CSAFPID-1713544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-4xb0_",
"product_id": "CSAFPID-1713545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-5xb0_",
"product_id": "CSAFPID-1713546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_ac_dc_rly__6ag1214-1bg40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1760881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1760958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1760993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761123",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc",
"product_id": "CSAFPID-1761149",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc",
"product_id": "CSAFPID-1712891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-2xb0_",
"product_id": "CSAFPID-1713547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-4xb0_",
"product_id": "CSAFPID-1713548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-5xb0_",
"product_id": "CSAFPID-1713549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_dc__6ag1214-1ag40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly",
"product_id": "CSAFPID-1712892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-2xb0_",
"product_id": "CSAFPID-1713550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-4xb0_",
"product_id": "CSAFPID-1713551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-5xb0_",
"product_id": "CSAFPID-1713552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214_dc_dc_rly__6ag1214-1hg40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760959",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1760994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761098",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc",
"product_id": "CSAFPID-1761150",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc_dc_dc_rail",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc_dc_dc_rail",
"product_id": "CSAFPID-1712893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc_dc_dc_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214c_dc_dc_dc_rail__6ag2214-1ag40-1xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214c_dc_dc_dc_rail__6ag2214-1ag40-1xb0_",
"product_id": "CSAFPID-1713553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214c_dc_dc_dc_rail__6ag2214-1ag40-1xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1760995",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761047",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761099",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc",
"product_id": "CSAFPID-1761151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_dc",
"product_id": "CSAFPID-1712894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_dc__6ag1214-1af40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_dc__6ag1214-1af40-5xb0_",
"product_id": "CSAFPID-1713554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc_dc_dc__6ag1214-1af40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_rly",
"product_id": "CSAFPID-1712895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_rly__6ag1214-1hf40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1214fc_dc_dc_rly__6ag1214-1hf40-5xb0_",
"product_id": "CSAFPID-1713555",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1214fc_dc_dc_rly__6ag1214-1hf40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1760884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1760961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1760996",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761022",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761048",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761100",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac",
"product_id": "CSAFPID-1761152",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly",
"product_id": "CSAFPID-1712896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-2xb0_",
"product_id": "CSAFPID-1713556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-4xb0_",
"product_id": "CSAFPID-1713557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-5xb0_",
"product_id": "CSAFPID-1713558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_ac_dc_rly__6ag1215-1bg40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1760885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1760962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1760997",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc",
"product_id": "CSAFPID-1761153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc",
"product_id": "CSAFPID-1712897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-2xb0_",
"product_id": "CSAFPID-1713559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-4xb0_",
"product_id": "CSAFPID-1713560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_dc__6ag1215-1ag40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly",
"product_id": "CSAFPID-1712898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_rly:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-2xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-2xb0_",
"product_id": "CSAFPID-1713561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-2xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-4xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-4xb0_",
"product_id": "CSAFPID-1713562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-4xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-5xb0_",
"product_id": "CSAFPID-1713563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215_dc_dc_rly__6ag1215-1hg40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1760998",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761050",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc",
"product_id": "CSAFPID-1761154",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc_dc_dc",
"product_id": "CSAFPID-1712899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215c_dc_dc_dc__6ag1215-1ag40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215c_dc_dc_dc__6ag1215-1ag40-5xb0_",
"product_id": "CSAFPID-1713564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215c_dc_dc_dc__6ag1215-1ag40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1760999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761103",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc",
"product_id": "CSAFPID-1761155",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc:4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc_dc_dc",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc_dc_dc",
"product_id": "CSAFPID-1712900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc_dc_dc:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1200_cpu_1215fc_dc_dc_dc__6ag1215-1af40-5xb0_",
"product": {
"name": "siplus_s7-1200_cpu_1215fc_dc_dc_dc__6ag1215-1af40-5xb0_",
"product_id": "CSAFPID-1713565",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1200_cpu_1215fc_dc_dc_dc__6ag1215-1af40-5xb0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak00-2ab0_",
"product_id": "CSAFPID-1703030",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_",
"product_id": "CSAFPID-1666750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_",
"product_id": "CSAFPID-1666751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_",
"product_id": "CSAFPID-1666752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_",
"product_id": "CSAFPID-1666753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn__6ag1511-1ak02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail",
"product_id": "CSAFPID-1666566",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_",
"product_id": "CSAFPID-1666754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak01-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_",
"product_id": "CSAFPID-1666755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_t1_rail__6ag2511-1ak02-1ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_",
"product_id": "CSAFPID-1666756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_",
"product_id": "CSAFPID-1666757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511-1_pn_tx_rail__6ag2511-1ak02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk00-2ab0_",
"product_id": "CSAFPID-1703031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_",
"product_id": "CSAFPID-1666758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_",
"product_id": "CSAFPID-1666759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1511f-1_pn__6ag1511-1fk02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al00-2ab0_",
"product_id": "CSAFPID-1703032",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_",
"product_id": "CSAFPID-1666760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_",
"product_id": "CSAFPID-1666761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_",
"product_id": "CSAFPID-1666762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_",
"product_id": "CSAFPID-1666763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513-1_pn__6ag1513-1al02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn",
"product_id": "CSAFPID-1666570",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl00-2ab0_",
"product_id": "CSAFPID-1703033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_",
"product_id": "CSAFPID-1666764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_",
"product_id": "CSAFPID-1666765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1513f-1_pn__6ag1513-1fl02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn",
"product_id": "CSAFPID-1666571",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_",
"product_id": "CSAFPID-1666766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_",
"product_id": "CSAFPID-1666767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn__6ag1515-2fm02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail",
"product_id": "CSAFPID-1666572",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_",
"product_id": "CSAFPID-1666768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_rail__6ag2515-2fm02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_",
"product_id": "CSAFPID-1666769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515f-2_pn_t2_rail__6ag2515-2fm01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn",
"product_id": "CSAFPID-1737285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn__6ag1515-2rm00-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn__6ag1515-2rm00-7ab0_",
"product_id": "CSAFPID-1702993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn__6ag1515-2rm00-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail",
"product_id": "CSAFPID-1712901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_",
"product_id": "CSAFPID-1666825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1515r-2_pn_tx_rail__6ag2515-2rm00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-2ab0_",
"product_id": "CSAFPID-1703034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-7ab0_",
"product_id": "CSAFPID-1703035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an00-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_",
"product_id": "CSAFPID-1666770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_",
"product_id": "CSAFPID-1666771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an01-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_",
"product_id": "CSAFPID-1666772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_",
"product_id": "CSAFPID-1666773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp__6ag1516-3an02-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_",
"product_id": "CSAFPID-1666774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_rail__6ag2516-3an02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_",
"product_id": "CSAFPID-1666775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516-3_pn_dp_tx_rail__6ag2516-3an01-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn00-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn00-2ab0_",
"product_id": "CSAFPID-1703036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn00-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_",
"product_id": "CSAFPID-1666776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn01-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_",
"product_id": "CSAFPID-1666777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp__6ag1516-3fn02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_",
"product_id": "CSAFPID-1666778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_",
"product_id": "CSAFPID-1666779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1516f-3_pn_dp_rail__6ag2516-3fn02-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1737269",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1517h-3_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1760888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1517h-3_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product": {
"name": "siplus_s7-1500_cpu_1517h-3_pn",
"product_id": "CSAFPID-1760965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1517h-3_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1517h-3_pn__6ag1517-3hp00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1517h-3_pn__6ag1517-3hp00-4ab0_",
"product_id": "CSAFPID-1702994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1517h-3_pn__6ag1517-3hp00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1760889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn",
"product_id": "CSAFPID-1760966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp",
"product_id": "CSAFPID-1712907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_",
"product_id": "CSAFPID-1666780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp__6ag1518-4ap00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp",
"product_id": "CSAFPID-1712908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product": {
"name": "siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_",
"product_id": "CSAFPID-1615264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518-4_pn_dp_mfp__6ag1518-4ax00-4ac0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1760890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn",
"product_id": "CSAFPID-1760967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp",
"product_id": "CSAFPID-1712909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn_dp:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_",
"product_id": "CSAFPID-1666781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518f-4_pn_dp__6ag1518-4fp00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1737302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518hf-4_pn:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1760891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518hf-4_pn:3.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product": {
"name": "siplus_s7-1500_cpu_1518hf-4_pn",
"product_id": "CSAFPID-1760968",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518hf-4_pn:3.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-1500_cpu_1518hf-4_pn__6ag1518-4jp00-4ab0_",
"product": {
"name": "siplus_s7-1500_cpu_1518hf-4_pn__6ag1518-4jp00-4ab0_",
"product_id": "CSAFPID-1702995",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-1500_cpu_1518hf-4_pn__6ag1518-4jp00-4ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-300_cpu_314c-2_pn_dp__6ag1314-6eh04-7ab0_",
"product": {
"name": "siplus_s7-300_cpu_314c-2_pn_dp__6ag1314-6eh04-7ab0_",
"product_id": "CSAFPID-1637802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-300_cpu_314c-2_pn_dp__6ag1314-6eh04-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-300_cpu_315-2_pn_dp__6ag1315-2eh14-7ab0_",
"product": {
"name": "siplus_s7-300_cpu_315-2_pn_dp__6ag1315-2eh14-7ab0_",
"product_id": "CSAFPID-1637803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-300_cpu_315-2_pn_dp__6ag1315-2eh14-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-300_cpu_315f-2_pn_dp__6ag1315-2fj14-2ab0_",
"product": {
"name": "siplus_s7-300_cpu_315f-2_pn_dp__6ag1315-2fj14-2ab0_",
"product_id": "CSAFPID-1637804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-300_cpu_315f-2_pn_dp__6ag1315-2fj14-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-300_cpu_317-2_pn_dp__6ag1317-2ek14-7ab0_",
"product": {
"name": "siplus_s7-300_cpu_317-2_pn_dp__6ag1317-2ek14-7ab0_",
"product_id": "CSAFPID-1637805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-300_cpu_317-2_pn_dp__6ag1317-2ek14-7ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_s7-300_cpu_317f-2_pn_dp__6ag1317-2fk14-2ab0_",
"product": {
"name": "siplus_s7-300_cpu_317f-2_pn_dp__6ag1317-2fk14-2ab0_",
"product_id": "CSAFPID-1637806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_s7-300_cpu_317f-2_pn_dp__6ag1317-2fk14-2ab0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siplus_tim_1531_irc__6ag1543-1mx00-7xe0_",
"product": {
"name": "siplus_tim_1531_irc__6ag1543-1mx00-7xe0_",
"product_id": "CSAFPID-1637814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siplus_tim_1531_irc__6ag1543-1mx00-7xe0_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec",
"product": {
"name": "siprotec",
"product_id": "CSAFPID-1750039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766691",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766693",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766695",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766696",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766697",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766698",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766699",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766700",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766701",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766702",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766704",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766705",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766706",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766707",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766708",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766709",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766710",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766712",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766713",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766714",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766715",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766716",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766717",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766718",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766719",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766720",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766721",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766722",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766723",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766724",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766741",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766742",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766743",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766744",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766745",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766689",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5",
"product": {
"name": "siprotec_5",
"product_id": "CSAFPID-1766690",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84__cp300_",
"product": {
"name": "siprotec_5_6md84__cp300_",
"product_id": "CSAFPID-1615375",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761158",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762134",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761219",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762744",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1762988",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763171",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763232",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763537",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763659",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763720",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763903",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1763964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764147",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761402",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764269",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764696",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1764940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765123",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765245",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765367",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761524",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765611",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1765977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766099",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1766587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md84_cp300",
"product": {
"name": "siprotec_5_6md84_cp300",
"product_id": "CSAFPID-1761707",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md84_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85__cp200_",
"product": {
"name": "siprotec_5_6md85__cp200_",
"product_id": "CSAFPID-1615377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85__cp300_",
"product": {
"name": "siprotec_5_6md85__cp300_",
"product_id": "CSAFPID-1615379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761159",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762745",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1762989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763050",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763538",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763721",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763904",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1763965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764026",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764148",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764697",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1764941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765368",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1765978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766100",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766161",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766222",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1766588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761647",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp200",
"product": {
"name": "siprotec_5_6md85_cp200",
"product_id": "CSAFPID-1761708",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762502",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1762990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763356",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763722",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763905",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1763966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764149",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764698",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1764942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765369",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765613",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765674",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1765979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766040",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766162",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1766589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761648",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md85_cp300",
"product": {
"name": "siprotec_5_6md85_cp300",
"product_id": "CSAFPID-1761709",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md85_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86__cp200_",
"product": {
"name": "siprotec_5_6md86__cp200_",
"product_id": "CSAFPID-1615381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86__cp300_",
"product": {
"name": "siprotec_5_6md86__cp300_",
"product_id": "CSAFPID-1615383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761161",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761954",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761222",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762503",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1762991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763052",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763174",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763418",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763662",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763723",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1763967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764150",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764272",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764699",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1764943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765370",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765614",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765675",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1765980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766163",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1766590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761649",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp200",
"product": {
"name": "siprotec_5_6md86_cp200",
"product_id": "CSAFPID-1761710",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761162",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762138",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762565",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1762992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763175",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763724",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1763968",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764273",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764700",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1764944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765371",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765615",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1765981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766042",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766103",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1766591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761650",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md86_cp300",
"product": {
"name": "siprotec_5_6md86_cp300",
"product_id": "CSAFPID-1761711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md86_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89__cp300_",
"product": {
"name": "siprotec_5_6md89__cp300_",
"product_id": "CSAFPID-1615385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761163",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762139",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762566",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1762993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763054",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763664",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1763969",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764030",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764152",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764213",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764518",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764701",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1764945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765555",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765616",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1765982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766043",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766165",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766409",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1766592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761651",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6md89_cp300",
"product": {
"name": "siprotec_5_6md89_cp300",
"product_id": "CSAFPID-1761712",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6md89_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85__cp300_",
"product": {
"name": "siprotec_5_6mu85__cp300_",
"product_id": "CSAFPID-1615387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762140",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762689",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1762994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763177",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763604",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763665",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1763970",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764031",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764092",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764153",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764214",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764336",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764519",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764702",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1764946",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765129",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765190",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765251",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765373",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765678",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1765983",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766105",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766166",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766227",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766288",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766532",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1766593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761652",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_6mu85_cp300",
"product": {
"name": "siprotec_5_6mu85_cp300",
"product_id": "CSAFPID-1761713",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_6mu85_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85__cp200_",
"product": {
"name": "siprotec_5_7ke85__cp200_",
"product_id": "CSAFPID-1615389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85__cp300_",
"product": {
"name": "siprotec_5_7ke85__cp300_",
"product_id": "CSAFPID-1615391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761165",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761897",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761958",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762019",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762141",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762202",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762263",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762446",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762568",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762690",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762934",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761287",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1762995",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763056",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763117",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763178",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763605",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763666",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763910",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1763971",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764032",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764093",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764154",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761409",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764215",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764276",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764398",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764520",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1764947",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765008",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765130",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765191",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765252",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765374",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761531",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765679",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765923",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1765984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766106",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766228",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1766594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp200",
"product": {
"name": "siprotec_5_7ke85_cp200",
"product_id": "CSAFPID-1761714",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761166",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761898",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761959",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762020",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762142",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762203",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762264",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761227",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762447",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762691",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762935",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761288",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1762996",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763057",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763179",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763362",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763423",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763606",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763667",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763911",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1763972",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764033",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764094",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764155",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761410",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764216",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764277",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764338",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764521",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764704",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1764948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765009",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765070",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765131",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765375",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761532",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765741",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765924",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1765985",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766107",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766168",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1766595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761654",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7ke85_cp300",
"product": {
"name": "siprotec_5_7ke85_cp300",
"product_id": "CSAFPID-1761715",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7ke85_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82__cp100_",
"product": {
"name": "siprotec_5_7sa82__cp100_",
"product_id": "CSAFPID-1615393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82__cp100_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82__cp150_",
"product": {
"name": "siprotec_5_7sa82__cp150_",
"product_id": "CSAFPID-1615395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82__cp150_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761167",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761899",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761960",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762021",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762143",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762204",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761228",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762570",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762753",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762936",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1762997",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763058",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763180",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763363",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763424",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763607",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763668",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1763973",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764034",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764095",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764156",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761411",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764278",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764400",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764461",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764705",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1764949",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765010",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765376",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761533",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765498",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765559",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765681",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765742",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765925",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1765986",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766047",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766108",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766169",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766535",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1766596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761655",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp100",
"product": {
"name": "siprotec_5_7sa82_cp100",
"product_id": "CSAFPID-1761716",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp100:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761168",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761900",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761961",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762022",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762083",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762205",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762449",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762571",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762693",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762754",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762937",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1762998",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763059",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763120",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763181",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763364",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763425",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763608",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763669",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763913",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1763974",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764035",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764096",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764279",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764340",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764401",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764462",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764523",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764706",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764889",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1764950",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765011",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765072",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765194",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761534",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765499",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765682",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765743",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765926",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1765987",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766048",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766109",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766170",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766536",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1766597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761656",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa82_cp150",
"product": {
"name": "siprotec_5_7sa82_cp150",
"product_id": "CSAFPID-1761717",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa82_cp150:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86__cp200_",
"product": {
"name": "siprotec_5_7sa86__cp200_",
"product_id": "CSAFPID-1615399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86__cp300_",
"product": {
"name": "siprotec_5_7sa86__cp300_",
"product_id": "CSAFPID-1615400",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761169",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761901",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762023",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762145",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762206",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762267",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762572",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762694",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762755",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762938",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1762999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763060",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763121",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763182",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763304",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763365",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763426",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763609",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763670",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763914",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1763975",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764036",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764158",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764219",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764280",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764341",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764402",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764524",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764707",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764890",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1764951",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765012",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765134",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765256",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761535",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765500",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765683",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765744",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765927",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1765988",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766110",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766171",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766232",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766537",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1766598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761657",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp200",
"product": {
"name": "siprotec_5_7sa86_cp200",
"product_id": "CSAFPID-1761718",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761170",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762024",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762146",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762207",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762268",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762695",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762756",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1762939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763061",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763122",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763183",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763244",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763366",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763427",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763610",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763671",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763915",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1763976",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764037",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764098",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764159",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764220",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764281",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764342",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764403",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764647",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764708",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764891",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1764952",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765013",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765074",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765196",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765257",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761536",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765501",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765562",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765684",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765745",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765928",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1765989",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766050",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766111",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766538",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1766599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761658",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa86_cp300",
"product": {
"name": "siprotec_5_7sa86_cp300",
"product_id": "CSAFPID-1761719",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa86_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87__cp200_",
"product": {
"name": "siprotec_5_7sa87__cp200_",
"product_id": "CSAFPID-1615402",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87__cp300_",
"product": {
"name": "siprotec_5_7sa87__cp300_",
"product_id": "CSAFPID-1615404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761171",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761903",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762025",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762086",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762147",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762269",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761232",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762513",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762696",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1762940",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763062",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763123",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763184",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763245",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763367",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763428",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763611",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763672",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763916",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1763977",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764099",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764221",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764282",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764343",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764648",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764709",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764892",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1764953",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765014",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761537",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765502",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765685",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765746",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1765990",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766051",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766356",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1766600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761659",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp200",
"product": {
"name": "siprotec_5_7sa87_cp200",
"product_id": "CSAFPID-1761720",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761904",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761965",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762026",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762087",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762148",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762270",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762514",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762697",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1762941",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763063",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763124",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763185",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763368",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763673",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763734",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763917",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1763978",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764100",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764161",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764222",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764283",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764344",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764527",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764649",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764710",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764893",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1764954",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765015",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765198",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761538",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765503",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765564",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765686",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765747",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1765991",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766052",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766174",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766418",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1766601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761660",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sa87_cp300",
"product": {
"name": "siprotec_5_7sa87_cp300",
"product_id": "CSAFPID-1761721",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sa87_cp300:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82__cp100_",
"product": {
"name": "siprotec_5_7sd82__cp100_",
"product_id": "CSAFPID-1615406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82__cp100_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82__cp150_",
"product": {
"name": "siprotec_5_7sd82__cp150_",
"product_id": "CSAFPID-1615408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82__cp150_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761173",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761905",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761966",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762027",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762149",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762210",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762271",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762576",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762698",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1762942",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763064",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763125",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763186",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763369",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761356",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763613",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763674",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763918",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1763979",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764040",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764162",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764223",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764284",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764345",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764406",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764528",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764650",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764894",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1764955",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765138",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765199",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765260",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765565",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765687",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765748",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765931",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1765992",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766053",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766175",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1766602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp100",
"product": {
"name": "siprotec_5_7sd82_cp100",
"product_id": "CSAFPID-1761722",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp100:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761174",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761967",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762028",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762150",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762272",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762516",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762699",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1762943",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763065",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763126",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763187",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763370",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763614",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763675",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763919",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1763980",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764163",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761418",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764224",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764285",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764407",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764651",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764712",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764895",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1764956",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765017",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765139",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765200",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765505",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765566",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765688",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765749",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765932",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1765993",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766054",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1766603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761662",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd82_cp150",
"product": {
"name": "siprotec_5_7sd82_cp150",
"product_id": "CSAFPID-1761723",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd82_cp150:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86__cp200_",
"product": {
"name": "siprotec_5_7sd86__cp200_",
"product_id": "CSAFPID-1615412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86__cp200_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86__cp300_",
"product": {
"name": "siprotec_5_7sd86__cp300_",
"product_id": "CSAFPID-1615414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86__cp300_:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761175",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761907",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761968",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762029",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762151",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762212",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762273",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762700",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1762944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763066",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763127",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763249",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763371",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763615",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763676",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1763981",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764042",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764103",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764164",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.49:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761419",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.50:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764286",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.51:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.52:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764408",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.54:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.56:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764652",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.57:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764713",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.58:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.59:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.60:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764896",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.61:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1764957",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.62:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765018",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.63:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.64:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765140",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.65:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765201",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.66:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765262",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.67:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.68:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.69:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.70:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.72:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.73:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765689",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.74:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765750",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.75:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.76:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.77:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.78:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1765994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.79:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.80:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.81:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766177",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.82:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.83:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.84:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.85:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.86:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.87:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.88:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1766604",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.89:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp200",
"product": {
"name": "siprotec_5_7sd86_cp200",
"product_id": "CSAFPID-1761724",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp200:9.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761176",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761908",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761969",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762030",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762091",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762152",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762213",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762518",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762701",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1762945",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763067",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763128",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763189",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763372",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763555",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.39:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1761359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763616",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763677",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.41:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.43:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.44:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1763982",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1764043",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.47:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",
"product": {
"name": "siprotec_5_7sd86_cp300",
"product_id": "CSAFPID-1764104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:siemens:siprotec_5_7sd86_cp300:9.48:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "siprotec_5_7sd86_cp300",