Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-24112 (GCVE-0-2021-24112)
Vulnerability from cvelistv5
- Remote Code Execution
| URL | Tags | ||
|---|---|---|---|
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Visual Studio 2019 for Mac |
Version: 8.0.0 < publication cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:* |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T19:21:18.636Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:*"
],
"platforms": [
"Unknown"
],
"product": "Visual Studio 2019 for Mac",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "publication",
"status": "affected",
"version": "8.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:microsoft:mono:*:*:*:*:*:*:*:*"
],
"platforms": [
"Unknown"
],
"product": "Mono 6.12.0",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "publication",
"status": "affected",
"version": "6.12.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*"
],
"platforms": [
"Unknown"
],
"product": ".NET Core 2.1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "publication",
"status": "affected",
"version": "2.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*"
],
"platforms": [
"Unknown"
],
"product": ".NET Core 3.1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "publication",
"status": "affected",
"version": "3.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*"
],
"platforms": [
"Unknown"
],
"product": ".NET 5.0",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "publication",
"status": "affected",
"version": "5.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-02-09T08:00:00+00:00",
"descriptions": [
{
"lang": "en-US",
"value": ".NET Core Remote Code Execution Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote Code Execution",
"lang": "en-US",
"type": "Impact"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-29T22:33:25.762Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
],
"title": ".NET Core Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2021-24112",
"datePublished": "2021-02-25T23:01:57",
"dateReserved": "2021-01-13T00:00:00",
"dateUpdated": "2024-08-03T19:21:18.636Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-24112\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2021-02-25T23:15:16.570\",\"lastModified\":\"2024-11-21T05:52:22.857\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\".NET Core Remote Code Execution Vulnerability\"},{\"lang\":\"es\",\"value\":\"Una Vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota de .NET Core. Este ID de CVE es diferente de CVE-2021-26701\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0\",\"versionEndIncluding\":\"5.0.2\",\"matchCriteriaId\":\"8797E7EA-A66B-4B9C-AA2A-DAB08A8A16DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1\",\"versionEndIncluding\":\"2.1.24\",\"matchCriteriaId\":\"7C5D87DA-378D-4457-986B-8A0796ED00EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1\",\"versionEndIncluding\":\"3.1.11\",\"matchCriteriaId\":\"1B672ED7-CB65-4D0E-AD4B-4508C4FA8C92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:mono:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12.0\",\"versionEndExcluding\":\"6.12.0.122\",\"matchCriteriaId\":\"B46EB9C9-0D62-4F64-9C74-1F372F1543A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"21FE380F-7A47-4C72-8F07-526226531175\"}]}]}],\"references\":[{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2024-AVI-0595
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MYSQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de sécurité pour la vulnérabilité CVE-2024-21185 | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Connectors versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Workbench versions antérieures à 8.0.38 | ||
| Oracle | MySQL | MySQL Cluster versions 7.5.x antérieures à 7.5.35, versions 7.6.x antérieures à 7.6.31, versions 8.0.x antérieures à 8.0.38, versions 8.4.x antérieures à 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Server versions 8.0.x antérieures à 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de sécurité et versions 8.4.x antérieures à 8.4.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-21185",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions ant\u00e9rieures \u00e0 8.0.38",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.5.x ant\u00e9rieures \u00e0 7.5.35, versions 7.6.x ant\u00e9rieures \u00e0 7.6.31, versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.4.x ant\u00e9rieures \u00e0 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de s\u00e9curit\u00e9 ",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de s\u00e9curit\u00e9 et versions 8.4.x ant\u00e9rieures \u00e0 8.4.1",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-21176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21176"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2021-24112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24112"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21170"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-22257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22257"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
}
],
"initial_release_date": "2024-07-17T00:00:00",
"last_revision_date": "2024-07-17T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MYSQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose",
"url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#MSQL"
}
]
}
CERTFR-2021-AVI-106
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft .Net. Elles permettent à un attaquant de provoquer un déni de service et une exécution de code à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft .NET Framework 4.8 | ||
| Microsoft | N/A | Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 | ||
| Microsoft | N/A | .NET Core 3.1 | ||
| Microsoft | N/A | Microsoft .NET Framework 4.7.2 | ||
| Microsoft | N/A | .NET Core 2.1 | ||
| Microsoft | N/A | Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2 | ||
| Microsoft | N/A | .NET 5.0 | ||
| Microsoft | N/A | Microsoft .NET Framework 4.6 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft .NET Framework 4.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET Core 3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft .NET Framework 4.7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET Core 2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft .NET Framework 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-24111",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24111"
},
{
"name": "CVE-2021-24112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24112"
},
{
"name": "CVE-2021-26701",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26701"
},
{
"name": "CVE-2021-1721",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1721"
}
],
"initial_release_date": "2021-02-10T00:00:00",
"last_revision_date": "2021-02-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-106",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft .Net\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service et une ex\u00e9cution de code \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft .Net",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 09 f\u00e9vrier 2021",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
WID-SEC-W-2024-1656
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1656 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1656.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1656 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1656"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle MySQL vom 2024-07-16",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6934-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6934-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-5D9DC19F2D vom 2024-08-12",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5d9dc19f2d"
},
{
"category": "external",
"summary": "F5 Security Advisory K000140908 vom 2024-09-03",
"url": "https://my.f5.com/manage/s/article/K000140908"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173959 vom 2024-10-23",
"url": "https://www.ibm.com/support/pages/node/7173959"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180384 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180384"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-12T23:00:00.000+00:00",
"generator": {
"date": "2025-01-13T11:08:27.718+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-1656",
"initial_release_date": "2024-07-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.1.0",
"product": {
"name": "Oracle MySQL \u003c=8.1.0",
"product_id": "1502322"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.1.0",
"product": {
"name": "Oracle MySQL \u003c=8.1.0",
"product_id": "1502322-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.34",
"product": {
"name": "Oracle MySQL \u003c=8.0.34",
"product_id": "1502323"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.34",
"product": {
"name": "Oracle MySQL \u003c=8.0.34",
"product_id": "1502323-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.2.0",
"product": {
"name": "Oracle MySQL \u003c=8.2.0",
"product_id": "1566668"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.2.0",
"product": {
"name": "Oracle MySQL \u003c=8.2.0",
"product_id": "1566668-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "T032120"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "T032120-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.3.0",
"product": {
"name": "Oracle MySQL \u003c=8.3.0",
"product_id": "T034178"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.3.0",
"product": {
"name": "Oracle MySQL \u003c=8.3.0",
"product_id": "T034178-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.37",
"product": {
"name": "Oracle MySQL \u003c=8.0.37",
"product_id": "T034179"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.37",
"product": {
"name": "Oracle MySQL \u003c=8.0.37",
"product_id": "T034179-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.0",
"product": {
"name": "Oracle MySQL \u003c=8.4.0",
"product_id": "T036237"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.0",
"product": {
"name": "Oracle MySQL \u003c=8.4.0",
"product_id": "T036237-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.34",
"product": {
"name": "Oracle MySQL \u003c=7.5.34",
"product_id": "T036238"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.34",
"product": {
"name": "Oracle MySQL \u003c=7.5.34",
"product_id": "T036238-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.30",
"product": {
"name": "Oracle MySQL \u003c=7.6.30",
"product_id": "T036239"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.30",
"product": {
"name": "Oracle MySQL \u003c=7.6.30",
"product_id": "T036239-fixed"
}
},
{
"category": "product_version",
"name": "8.4.1",
"product": {
"name": "Oracle MySQL 8.4.1",
"product_id": "T036240",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.1"
}
}
},
{
"category": "product_version",
"name": "9.0.0",
"product": {
"name": "Oracle MySQL 9.0.0",
"product_id": "T036241",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:9.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036274"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036274-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2021-24112"
},
{
"cve": "CVE-2023-37920",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52425",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-6129",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-20996",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-20996"
},
{
"cve": "CVE-2024-21125",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21125"
},
{
"cve": "CVE-2024-21127",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21127"
},
{
"cve": "CVE-2024-21129",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21129"
},
{
"cve": "CVE-2024-21130",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21130"
},
{
"cve": "CVE-2024-21134",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21134"
},
{
"cve": "CVE-2024-21135",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21135"
},
{
"cve": "CVE-2024-21137",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21137"
},
{
"cve": "CVE-2024-21142",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21142"
},
{
"cve": "CVE-2024-21157",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21157"
},
{
"cve": "CVE-2024-21159",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21159"
},
{
"cve": "CVE-2024-21160",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21160"
},
{
"cve": "CVE-2024-21162",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21162"
},
{
"cve": "CVE-2024-21163",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21163"
},
{
"cve": "CVE-2024-21165",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21165"
},
{
"cve": "CVE-2024-21166",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21166"
},
{
"cve": "CVE-2024-21170",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21170"
},
{
"cve": "CVE-2024-21171",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21171"
},
{
"cve": "CVE-2024-21173",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21173"
},
{
"cve": "CVE-2024-21176",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21176"
},
{
"cve": "CVE-2024-21177",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21177"
},
{
"cve": "CVE-2024-21179",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21179"
},
{
"cve": "CVE-2024-21185",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21185"
},
{
"cve": "CVE-2024-22257",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24549",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-25062"
}
]
}
wid-sec-w-2023-1805
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Hyperion bietet L\u00f6sungen f\u00fcr Business Intelligence, Planung und Konsolidierung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Hyperion ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1805 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1805.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1805 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1805"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2023 - Appendix Oracle Hyperion vom 2023-07-18",
"url": "https://www.oracle.com/security-alerts/cpujul2023.html#AppendixHYP"
}
],
"source_lang": "en-US",
"title": "Oracle Hyperion: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-07-18T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:55:50.861+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1805",
"initial_release_date": "2023-07-18T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-07-18T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Hyperion 11.2.13.0.000",
"product": {
"name": "Oracle Hyperion 11.2.13.0.000",
"product_id": "T028712",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:hyperion:11.2.13.0.000"
}
}
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-22062",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2023-22062"
},
{
"cve": "CVE-2023-22060",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2023-22060"
},
{
"cve": "CVE-2021-24112",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2021-24112"
}
]
}
wid-sec-w-2024-1656
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1656 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1656.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1656 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1656"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle MySQL vom 2024-07-16",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6934-1 vom 2024-07-31",
"url": "https://ubuntu.com/security/notices/USN-6934-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-5D9DC19F2D vom 2024-08-12",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5d9dc19f2d"
},
{
"category": "external",
"summary": "F5 Security Advisory K000140908 vom 2024-09-03",
"url": "https://my.f5.com/manage/s/article/K000140908"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7173959 vom 2024-10-23",
"url": "https://www.ibm.com/support/pages/node/7173959"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180384 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180384"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-12T23:00:00.000+00:00",
"generator": {
"date": "2025-01-13T11:08:27.718+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-1656",
"initial_release_date": "2024-07-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.1.0",
"product": {
"name": "Oracle MySQL \u003c=8.1.0",
"product_id": "1502322"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.1.0",
"product": {
"name": "Oracle MySQL \u003c=8.1.0",
"product_id": "1502322-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.34",
"product": {
"name": "Oracle MySQL \u003c=8.0.34",
"product_id": "1502323"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.34",
"product": {
"name": "Oracle MySQL \u003c=8.0.34",
"product_id": "1502323-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.2.0",
"product": {
"name": "Oracle MySQL \u003c=8.2.0",
"product_id": "1566668"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.2.0",
"product": {
"name": "Oracle MySQL \u003c=8.2.0",
"product_id": "1566668-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "T032120"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.36",
"product": {
"name": "Oracle MySQL \u003c=8.0.36",
"product_id": "T032120-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.3.0",
"product": {
"name": "Oracle MySQL \u003c=8.3.0",
"product_id": "T034178"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.3.0",
"product": {
"name": "Oracle MySQL \u003c=8.3.0",
"product_id": "T034178-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.37",
"product": {
"name": "Oracle MySQL \u003c=8.0.37",
"product_id": "T034179"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.37",
"product": {
"name": "Oracle MySQL \u003c=8.0.37",
"product_id": "T034179-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.0",
"product": {
"name": "Oracle MySQL \u003c=8.4.0",
"product_id": "T036237"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.0",
"product": {
"name": "Oracle MySQL \u003c=8.4.0",
"product_id": "T036237-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.34",
"product": {
"name": "Oracle MySQL \u003c=7.5.34",
"product_id": "T036238"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.34",
"product": {
"name": "Oracle MySQL \u003c=7.5.34",
"product_id": "T036238-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.30",
"product": {
"name": "Oracle MySQL \u003c=7.6.30",
"product_id": "T036239"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.30",
"product": {
"name": "Oracle MySQL \u003c=7.6.30",
"product_id": "T036239-fixed"
}
},
{
"category": "product_version",
"name": "8.4.1",
"product": {
"name": "Oracle MySQL 8.4.1",
"product_id": "T036240",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.1"
}
}
},
{
"category": "product_version",
"name": "9.0.0",
"product": {
"name": "Oracle MySQL 9.0.0",
"product_id": "T036241",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:9.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036274"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036274-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2021-24112"
},
{
"cve": "CVE-2023-37920",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-48795",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52425",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-6129",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-20996",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-20996"
},
{
"cve": "CVE-2024-21125",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21125"
},
{
"cve": "CVE-2024-21127",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21127"
},
{
"cve": "CVE-2024-21129",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21129"
},
{
"cve": "CVE-2024-21130",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21130"
},
{
"cve": "CVE-2024-21134",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21134"
},
{
"cve": "CVE-2024-21135",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21135"
},
{
"cve": "CVE-2024-21137",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21137"
},
{
"cve": "CVE-2024-21142",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21142"
},
{
"cve": "CVE-2024-21157",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21157"
},
{
"cve": "CVE-2024-21159",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21159"
},
{
"cve": "CVE-2024-21160",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21160"
},
{
"cve": "CVE-2024-21162",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21162"
},
{
"cve": "CVE-2024-21163",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21163"
},
{
"cve": "CVE-2024-21165",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21165"
},
{
"cve": "CVE-2024-21166",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21166"
},
{
"cve": "CVE-2024-21170",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21170"
},
{
"cve": "CVE-2024-21171",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21171"
},
{
"cve": "CVE-2024-21173",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21173"
},
{
"cve": "CVE-2024-21176",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21176"
},
{
"cve": "CVE-2024-21177",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21177"
},
{
"cve": "CVE-2024-21179",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21179"
},
{
"cve": "CVE-2024-21185",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-21185"
},
{
"cve": "CVE-2024-22257",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24549",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"notes": [
{
"category": "description",
"text": "In Oracle MySQL existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"Hoch\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028053",
"T036240",
"T000126",
"T031092",
"T001663",
"T036241",
"74185"
],
"last_affected": [
"1502323",
"1566668",
"1502322",
"T036238",
"T036239",
"1566667",
"T036237",
"T036274",
"T034179",
"T032120",
"T034178"
]
},
"release_date": "2024-07-16T22:00:00.000+00:00",
"title": "CVE-2024-25062"
}
]
}
WID-SEC-W-2023-1805
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Hyperion bietet L\u00f6sungen f\u00fcr Business Intelligence, Planung und Konsolidierung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Hyperion ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1805 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1805.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1805 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1805"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2023 - Appendix Oracle Hyperion vom 2023-07-18",
"url": "https://www.oracle.com/security-alerts/cpujul2023.html#AppendixHYP"
}
],
"source_lang": "en-US",
"title": "Oracle Hyperion: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-07-18T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:55:50.861+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1805",
"initial_release_date": "2023-07-18T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-07-18T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Hyperion 11.2.13.0.000",
"product": {
"name": "Oracle Hyperion 11.2.13.0.000",
"product_id": "T028712",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:hyperion:11.2.13.0.000"
}
}
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-22062",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2023-22062"
},
{
"cve": "CVE-2023-22060",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2023-22060"
},
{
"cve": "CVE-2021-24112",
"notes": [
{
"category": "description",
"text": "In Oracle Hyperion existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T028712"
]
},
"release_date": "2023-07-18T22:00:00.000+00:00",
"title": "CVE-2021-24112"
}
]
}
var-202102-1065
Vulnerability from variot
.NET Core Remote Code Execution Vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202102-1065",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mono",
"scope": "lt",
"trust": 1.0,
"vendor": "microsoft",
"version": "6.12.0.122"
},
{
"model": ".net core",
"scope": "gte",
"trust": 1.0,
"vendor": "microsoft",
"version": "3.1"
},
{
"model": ".net",
"scope": "gte",
"trust": 1.0,
"vendor": "microsoft",
"version": "5.0"
},
{
"model": ".net core",
"scope": "lte",
"trust": 1.0,
"vendor": "microsoft",
"version": "3.1.11"
},
{
"model": "visual studio 2019",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": ".net",
"scope": "lte",
"trust": 1.0,
"vendor": "microsoft",
"version": "5.0.2"
},
{
"model": ".net core",
"scope": "lte",
"trust": 1.0,
"vendor": "microsoft",
"version": "2.1.24"
},
{
"model": "mono",
"scope": "gte",
"trust": 1.0,
"vendor": "microsoft",
"version": "6.12.0"
},
{
"model": ".net core",
"scope": "gte",
"trust": 1.0,
"vendor": "microsoft",
"version": "2.1"
},
{
"model": ".net core",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": ".net",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "microsoft visual studio",
"scope": null,
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": null
},
{
"model": "mono",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
"version": "6.12.0"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"cve": "CVE-2021-24112",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2021-24112",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2021-24112",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "secure@microsoft.com",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2021-24112",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-24112",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-24112",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "secure@microsoft.com",
"id": "CVE-2021-24112",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-24112",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNNVD",
"id": "CNNVD-202102-681",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULMON",
"id": "CVE-2021-24112",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": ".NET Core Remote Code Execution Vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "VULMON",
"id": "CVE-2021-24112"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-24112",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2021.2737",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-24112",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"id": "VAR-202102-1065",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.19172932
},
"last_update_date": "2024-11-23T19:59:16.685000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": ".NET\u00a0Core\u00a0Remote\u00a0Code\u00a0Execution\u00a0Vulnerability Security Update Guide",
"trust": 0.8,
"url": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24112"
},
{
"title": "Microsoft .NET Core Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143004"
},
{
"title": "Red Hat: CVE-2021-24112",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-24112"
},
{
"title": "Arch Linux Advisories: [ASA-202103-17] dotnet-sdk: multiple issues",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202103-17"
},
{
"title": "Arch Linux Issues: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-24112 log"
},
{
"title": "Arch Linux Advisories: [ASA-202103-16] dotnet-runtime: multiple issues",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202103-16"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2021-24112"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-24112"
},
{
"trust": 0.8,
"url": "https://www.ipa.go.jp/security/ciadr/vul/20210210-ms.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2021/at210008.html"
},
{
"trust": 0.6,
"url": "https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-24112"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/microsoft-net-core-vulnerabilities-of-february-2021-34547"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2737"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-24112"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/196351"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-25T00:00:00",
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"date": "2021-11-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"date": "2021-02-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"date": "2021-02-25T23:15:16.570000",
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-02-26T00:00:00",
"db": "VULMON",
"id": "CVE-2021-24112"
},
{
"date": "2021-11-12T05:18:00",
"db": "JVNDB",
"id": "JVNDB-2021-004039"
},
{
"date": "2021-08-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202102-681"
},
{
"date": "2024-11-21T05:52:22.857000",
"db": "NVD",
"id": "CVE-2021-24112"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Microsoft\u00a0 Remote Code Execution Vulnerability in Product",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-004039"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202102-681"
}
],
"trust": 0.6
}
}
opensuse-su-2024:11556-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ibm-data-db2-6.12.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ibm-data-db2-6.12.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11556",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11556-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-24112 page",
"url": "https://www.suse.com/security/cve/CVE-2021-24112/"
}
],
"title": "ibm-data-db2-6.12.0-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11556-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ibm-data-db2-6.12.0-3.1.aarch64",
"product": {
"name": "ibm-data-db2-6.12.0-3.1.aarch64",
"product_id": "ibm-data-db2-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmono-2_0-1-6.12.0-3.1.aarch64",
"product": {
"name": "libmono-2_0-1-6.12.0-3.1.aarch64",
"product_id": "libmono-2_0-1-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmono-2_0-devel-6.12.0-3.1.aarch64",
"product": {
"name": "libmono-2_0-devel-6.12.0-3.1.aarch64",
"product_id": "libmono-2_0-devel-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"product": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"product_id": "libmonoboehm-2_0-1-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"product": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"product_id": "libmonoboehm-2_0-devel-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"product": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"product_id": "libmonosgen-2_0-1-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"product": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"product_id": "libmonosgen-2_0-devel-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-complete-6.12.0-3.1.aarch64",
"product": {
"name": "mono-complete-6.12.0-3.1.aarch64",
"product_id": "mono-complete-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-core-6.12.0-3.1.aarch64",
"product": {
"name": "mono-core-6.12.0-3.1.aarch64",
"product_id": "mono-core-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-data-6.12.0-3.1.aarch64",
"product": {
"name": "mono-data-6.12.0-3.1.aarch64",
"product_id": "mono-data-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-data-oracle-6.12.0-3.1.aarch64",
"product": {
"name": "mono-data-oracle-6.12.0-3.1.aarch64",
"product_id": "mono-data-oracle-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-data-sqlite-6.12.0-3.1.aarch64",
"product": {
"name": "mono-data-sqlite-6.12.0-3.1.aarch64",
"product_id": "mono-data-sqlite-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-devel-6.12.0-3.1.aarch64",
"product": {
"name": "mono-devel-6.12.0-3.1.aarch64",
"product_id": "mono-devel-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-extras-6.12.0-3.1.aarch64",
"product": {
"name": "mono-extras-6.12.0-3.1.aarch64",
"product_id": "mono-extras-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-locale-extras-6.12.0-3.1.aarch64",
"product": {
"name": "mono-locale-extras-6.12.0-3.1.aarch64",
"product_id": "mono-locale-extras-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-mvc-6.12.0-3.1.aarch64",
"product": {
"name": "mono-mvc-6.12.0-3.1.aarch64",
"product_id": "mono-mvc-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-reactive-6.12.0-3.1.aarch64",
"product": {
"name": "mono-reactive-6.12.0-3.1.aarch64",
"product_id": "mono-reactive-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-wcf-6.12.0-3.1.aarch64",
"product": {
"name": "mono-wcf-6.12.0-3.1.aarch64",
"product_id": "mono-wcf-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-web-6.12.0-3.1.aarch64",
"product": {
"name": "mono-web-6.12.0-3.1.aarch64",
"product_id": "mono-web-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-winforms-6.12.0-3.1.aarch64",
"product": {
"name": "mono-winforms-6.12.0-3.1.aarch64",
"product_id": "mono-winforms-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "mono-winfxcore-6.12.0-3.1.aarch64",
"product": {
"name": "mono-winfxcore-6.12.0-3.1.aarch64",
"product_id": "mono-winfxcore-6.12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "monodoc-core-6.12.0-3.1.aarch64",
"product": {
"name": "monodoc-core-6.12.0-3.1.aarch64",
"product_id": "monodoc-core-6.12.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ibm-data-db2-6.12.0-3.1.ppc64le",
"product": {
"name": "ibm-data-db2-6.12.0-3.1.ppc64le",
"product_id": "ibm-data-db2-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmono-2_0-1-6.12.0-3.1.ppc64le",
"product": {
"name": "libmono-2_0-1-6.12.0-3.1.ppc64le",
"product_id": "libmono-2_0-1-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmono-2_0-devel-6.12.0-3.1.ppc64le",
"product": {
"name": "libmono-2_0-devel-6.12.0-3.1.ppc64le",
"product_id": "libmono-2_0-devel-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"product": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"product_id": "libmonoboehm-2_0-1-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"product": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"product_id": "libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"product": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"product_id": "libmonosgen-2_0-1-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"product": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"product_id": "libmonosgen-2_0-devel-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-complete-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-complete-6.12.0-3.1.ppc64le",
"product_id": "mono-complete-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-core-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-core-6.12.0-3.1.ppc64le",
"product_id": "mono-core-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-data-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-data-6.12.0-3.1.ppc64le",
"product_id": "mono-data-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-data-oracle-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-data-oracle-6.12.0-3.1.ppc64le",
"product_id": "mono-data-oracle-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-data-sqlite-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-data-sqlite-6.12.0-3.1.ppc64le",
"product_id": "mono-data-sqlite-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-devel-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-devel-6.12.0-3.1.ppc64le",
"product_id": "mono-devel-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-extras-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-extras-6.12.0-3.1.ppc64le",
"product_id": "mono-extras-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-locale-extras-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-locale-extras-6.12.0-3.1.ppc64le",
"product_id": "mono-locale-extras-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-mvc-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-mvc-6.12.0-3.1.ppc64le",
"product_id": "mono-mvc-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-reactive-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-reactive-6.12.0-3.1.ppc64le",
"product_id": "mono-reactive-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-wcf-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-wcf-6.12.0-3.1.ppc64le",
"product_id": "mono-wcf-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-web-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-web-6.12.0-3.1.ppc64le",
"product_id": "mono-web-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-winforms-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-winforms-6.12.0-3.1.ppc64le",
"product_id": "mono-winforms-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mono-winfxcore-6.12.0-3.1.ppc64le",
"product": {
"name": "mono-winfxcore-6.12.0-3.1.ppc64le",
"product_id": "mono-winfxcore-6.12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "monodoc-core-6.12.0-3.1.ppc64le",
"product": {
"name": "monodoc-core-6.12.0-3.1.ppc64le",
"product_id": "monodoc-core-6.12.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ibm-data-db2-6.12.0-3.1.s390x",
"product": {
"name": "ibm-data-db2-6.12.0-3.1.s390x",
"product_id": "ibm-data-db2-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmono-2_0-1-6.12.0-3.1.s390x",
"product": {
"name": "libmono-2_0-1-6.12.0-3.1.s390x",
"product_id": "libmono-2_0-1-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmono-2_0-devel-6.12.0-3.1.s390x",
"product": {
"name": "libmono-2_0-devel-6.12.0-3.1.s390x",
"product_id": "libmono-2_0-devel-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"product": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"product_id": "libmonoboehm-2_0-1-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"product": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"product_id": "libmonoboehm-2_0-devel-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-1-6.12.0-3.1.s390x",
"product": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.s390x",
"product_id": "libmonosgen-2_0-1-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"product": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"product_id": "libmonosgen-2_0-devel-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-complete-6.12.0-3.1.s390x",
"product": {
"name": "mono-complete-6.12.0-3.1.s390x",
"product_id": "mono-complete-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-core-6.12.0-3.1.s390x",
"product": {
"name": "mono-core-6.12.0-3.1.s390x",
"product_id": "mono-core-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-data-6.12.0-3.1.s390x",
"product": {
"name": "mono-data-6.12.0-3.1.s390x",
"product_id": "mono-data-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-data-oracle-6.12.0-3.1.s390x",
"product": {
"name": "mono-data-oracle-6.12.0-3.1.s390x",
"product_id": "mono-data-oracle-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-data-sqlite-6.12.0-3.1.s390x",
"product": {
"name": "mono-data-sqlite-6.12.0-3.1.s390x",
"product_id": "mono-data-sqlite-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-devel-6.12.0-3.1.s390x",
"product": {
"name": "mono-devel-6.12.0-3.1.s390x",
"product_id": "mono-devel-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-extras-6.12.0-3.1.s390x",
"product": {
"name": "mono-extras-6.12.0-3.1.s390x",
"product_id": "mono-extras-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-locale-extras-6.12.0-3.1.s390x",
"product": {
"name": "mono-locale-extras-6.12.0-3.1.s390x",
"product_id": "mono-locale-extras-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-mvc-6.12.0-3.1.s390x",
"product": {
"name": "mono-mvc-6.12.0-3.1.s390x",
"product_id": "mono-mvc-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-reactive-6.12.0-3.1.s390x",
"product": {
"name": "mono-reactive-6.12.0-3.1.s390x",
"product_id": "mono-reactive-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-wcf-6.12.0-3.1.s390x",
"product": {
"name": "mono-wcf-6.12.0-3.1.s390x",
"product_id": "mono-wcf-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-web-6.12.0-3.1.s390x",
"product": {
"name": "mono-web-6.12.0-3.1.s390x",
"product_id": "mono-web-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-winforms-6.12.0-3.1.s390x",
"product": {
"name": "mono-winforms-6.12.0-3.1.s390x",
"product_id": "mono-winforms-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "mono-winfxcore-6.12.0-3.1.s390x",
"product": {
"name": "mono-winfxcore-6.12.0-3.1.s390x",
"product_id": "mono-winfxcore-6.12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "monodoc-core-6.12.0-3.1.s390x",
"product": {
"name": "monodoc-core-6.12.0-3.1.s390x",
"product_id": "monodoc-core-6.12.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ibm-data-db2-6.12.0-3.1.x86_64",
"product": {
"name": "ibm-data-db2-6.12.0-3.1.x86_64",
"product_id": "ibm-data-db2-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmono-2_0-1-6.12.0-3.1.x86_64",
"product": {
"name": "libmono-2_0-1-6.12.0-3.1.x86_64",
"product_id": "libmono-2_0-1-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmono-2_0-devel-6.12.0-3.1.x86_64",
"product": {
"name": "libmono-2_0-devel-6.12.0-3.1.x86_64",
"product_id": "libmono-2_0-devel-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"product": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"product_id": "libmonoboehm-2_0-1-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"product": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"product_id": "libmonoboehm-2_0-devel-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"product": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"product_id": "libmonosgen-2_0-1-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"product": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"product_id": "libmonosgen-2_0-devel-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-complete-6.12.0-3.1.x86_64",
"product": {
"name": "mono-complete-6.12.0-3.1.x86_64",
"product_id": "mono-complete-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-core-6.12.0-3.1.x86_64",
"product": {
"name": "mono-core-6.12.0-3.1.x86_64",
"product_id": "mono-core-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-data-6.12.0-3.1.x86_64",
"product": {
"name": "mono-data-6.12.0-3.1.x86_64",
"product_id": "mono-data-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-data-oracle-6.12.0-3.1.x86_64",
"product": {
"name": "mono-data-oracle-6.12.0-3.1.x86_64",
"product_id": "mono-data-oracle-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-data-sqlite-6.12.0-3.1.x86_64",
"product": {
"name": "mono-data-sqlite-6.12.0-3.1.x86_64",
"product_id": "mono-data-sqlite-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-devel-6.12.0-3.1.x86_64",
"product": {
"name": "mono-devel-6.12.0-3.1.x86_64",
"product_id": "mono-devel-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-extras-6.12.0-3.1.x86_64",
"product": {
"name": "mono-extras-6.12.0-3.1.x86_64",
"product_id": "mono-extras-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-locale-extras-6.12.0-3.1.x86_64",
"product": {
"name": "mono-locale-extras-6.12.0-3.1.x86_64",
"product_id": "mono-locale-extras-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-mvc-6.12.0-3.1.x86_64",
"product": {
"name": "mono-mvc-6.12.0-3.1.x86_64",
"product_id": "mono-mvc-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-reactive-6.12.0-3.1.x86_64",
"product": {
"name": "mono-reactive-6.12.0-3.1.x86_64",
"product_id": "mono-reactive-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-wcf-6.12.0-3.1.x86_64",
"product": {
"name": "mono-wcf-6.12.0-3.1.x86_64",
"product_id": "mono-wcf-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-web-6.12.0-3.1.x86_64",
"product": {
"name": "mono-web-6.12.0-3.1.x86_64",
"product_id": "mono-web-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-winforms-6.12.0-3.1.x86_64",
"product": {
"name": "mono-winforms-6.12.0-3.1.x86_64",
"product_id": "mono-winforms-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "mono-winfxcore-6.12.0-3.1.x86_64",
"product": {
"name": "mono-winfxcore-6.12.0-3.1.x86_64",
"product_id": "mono-winfxcore-6.12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "monodoc-core-6.12.0-3.1.x86_64",
"product": {
"name": "monodoc-core-6.12.0-3.1.x86_64",
"product_id": "monodoc-core-6.12.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ibm-data-db2-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.aarch64"
},
"product_reference": "ibm-data-db2-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ibm-data-db2-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.ppc64le"
},
"product_reference": "ibm-data-db2-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ibm-data-db2-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.s390x"
},
"product_reference": "ibm-data-db2-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ibm-data-db2-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.x86_64"
},
"product_reference": "ibm-data-db2-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-1-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.aarch64"
},
"product_reference": "libmono-2_0-1-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-1-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.ppc64le"
},
"product_reference": "libmono-2_0-1-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-1-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.s390x"
},
"product_reference": "libmono-2_0-1-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-1-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.x86_64"
},
"product_reference": "libmono-2_0-1-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-devel-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.aarch64"
},
"product_reference": "libmono-2_0-devel-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-devel-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.ppc64le"
},
"product_reference": "libmono-2_0-devel-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-devel-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.s390x"
},
"product_reference": "libmono-2_0-devel-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmono-2_0-devel-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.x86_64"
},
"product_reference": "libmono-2_0-devel-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.aarch64"
},
"product_reference": "libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.ppc64le"
},
"product_reference": "libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.s390x"
},
"product_reference": "libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-1-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.x86_64"
},
"product_reference": "libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.aarch64"
},
"product_reference": "libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le"
},
"product_reference": "libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.s390x"
},
"product_reference": "libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonoboehm-2_0-devel-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.x86_64"
},
"product_reference": "libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.aarch64"
},
"product_reference": "libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.ppc64le"
},
"product_reference": "libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.s390x"
},
"product_reference": "libmonosgen-2_0-1-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-1-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.x86_64"
},
"product_reference": "libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.aarch64"
},
"product_reference": "libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.ppc64le"
},
"product_reference": "libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.s390x"
},
"product_reference": "libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmonosgen-2_0-devel-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.x86_64"
},
"product_reference": "libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-complete-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-complete-6.12.0-3.1.aarch64"
},
"product_reference": "mono-complete-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-complete-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-complete-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-complete-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-complete-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-complete-6.12.0-3.1.s390x"
},
"product_reference": "mono-complete-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-complete-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-complete-6.12.0-3.1.x86_64"
},
"product_reference": "mono-complete-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-core-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-core-6.12.0-3.1.aarch64"
},
"product_reference": "mono-core-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-core-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-core-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-core-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-core-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-core-6.12.0-3.1.s390x"
},
"product_reference": "mono-core-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-core-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-core-6.12.0-3.1.x86_64"
},
"product_reference": "mono-core-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-6.12.0-3.1.aarch64"
},
"product_reference": "mono-data-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-data-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-6.12.0-3.1.s390x"
},
"product_reference": "mono-data-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-6.12.0-3.1.x86_64"
},
"product_reference": "mono-data-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-oracle-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.aarch64"
},
"product_reference": "mono-data-oracle-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-oracle-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-data-oracle-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-oracle-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.s390x"
},
"product_reference": "mono-data-oracle-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-oracle-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.x86_64"
},
"product_reference": "mono-data-oracle-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-sqlite-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.aarch64"
},
"product_reference": "mono-data-sqlite-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-sqlite-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-data-sqlite-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-sqlite-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.s390x"
},
"product_reference": "mono-data-sqlite-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-data-sqlite-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.x86_64"
},
"product_reference": "mono-data-sqlite-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-devel-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-devel-6.12.0-3.1.aarch64"
},
"product_reference": "mono-devel-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-devel-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-devel-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-devel-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-devel-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-devel-6.12.0-3.1.s390x"
},
"product_reference": "mono-devel-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-devel-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-devel-6.12.0-3.1.x86_64"
},
"product_reference": "mono-devel-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-extras-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-extras-6.12.0-3.1.aarch64"
},
"product_reference": "mono-extras-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-extras-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-extras-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-extras-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-extras-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-extras-6.12.0-3.1.s390x"
},
"product_reference": "mono-extras-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-extras-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-extras-6.12.0-3.1.x86_64"
},
"product_reference": "mono-extras-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-locale-extras-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.aarch64"
},
"product_reference": "mono-locale-extras-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-locale-extras-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-locale-extras-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-locale-extras-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.s390x"
},
"product_reference": "mono-locale-extras-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-locale-extras-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.x86_64"
},
"product_reference": "mono-locale-extras-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-mvc-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.aarch64"
},
"product_reference": "mono-mvc-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-mvc-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-mvc-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-mvc-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.s390x"
},
"product_reference": "mono-mvc-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-mvc-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.x86_64"
},
"product_reference": "mono-mvc-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-reactive-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.aarch64"
},
"product_reference": "mono-reactive-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-reactive-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-reactive-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-reactive-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.s390x"
},
"product_reference": "mono-reactive-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-reactive-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.x86_64"
},
"product_reference": "mono-reactive-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-wcf-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.aarch64"
},
"product_reference": "mono-wcf-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-wcf-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-wcf-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-wcf-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.s390x"
},
"product_reference": "mono-wcf-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-wcf-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.x86_64"
},
"product_reference": "mono-wcf-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-web-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-web-6.12.0-3.1.aarch64"
},
"product_reference": "mono-web-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-web-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-web-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-web-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-web-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-web-6.12.0-3.1.s390x"
},
"product_reference": "mono-web-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-web-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-web-6.12.0-3.1.x86_64"
},
"product_reference": "mono-web-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winforms-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.aarch64"
},
"product_reference": "mono-winforms-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winforms-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-winforms-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winforms-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.s390x"
},
"product_reference": "mono-winforms-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winforms-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.x86_64"
},
"product_reference": "mono-winforms-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winfxcore-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.aarch64"
},
"product_reference": "mono-winfxcore-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winfxcore-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.ppc64le"
},
"product_reference": "mono-winfxcore-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winfxcore-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.s390x"
},
"product_reference": "mono-winfxcore-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mono-winfxcore-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.x86_64"
},
"product_reference": "mono-winfxcore-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "monodoc-core-6.12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.aarch64"
},
"product_reference": "monodoc-core-6.12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "monodoc-core-6.12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.ppc64le"
},
"product_reference": "monodoc-core-6.12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "monodoc-core-6.12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.s390x"
},
"product_reference": "monodoc-core-6.12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "monodoc-core-6.12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.x86_64"
},
"product_reference": "monodoc-core-6.12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-24112"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-24112",
"url": "https://www.suse.com/security/cve/CVE-2021-24112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:ibm-data-db2-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmono-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonoboehm-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-1-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:libmonosgen-2_0-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-complete-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-core-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-oracle-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-data-sqlite-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-devel-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-locale-extras-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-mvc-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-reactive-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-wcf-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-web-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winforms-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:mono-winfxcore-6.12.0-3.1.x86_64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.aarch64",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.ppc64le",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.s390x",
"openSUSE Tumbleweed:monodoc-core-6.12.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2021-24112"
}
]
}
NCSC-2024-0303
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Er zijn kwetsbaarheden verholpen in Oracle MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24112"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20996"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21125"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21127"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21130"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21134"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21135"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21137"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21142"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21157"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21159"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21160"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21162"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21163"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21165"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21166"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21170"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21171"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21173"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21176"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21177"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21179"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
},
{
"category": "external",
"summary": "Reference - oracle",
"url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ibm; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-07-17T13:54:56.036488Z",
"id": "NCSC-2024-0303",
"initial_release_date": "2024-07-17T13:54:56.036488Z",
"revision_history": [
{
"date": "2024-07-17T13:54:56.036488Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-611599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-912112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-1503309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-764939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-912115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912117",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-611602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503657",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503659",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-1503321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93462",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93461",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93336",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-94333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-248612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-716944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-912999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:9.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-24112",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24112.json"
}
],
"title": "CVE-2021-24112"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-20996",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-20996"
},
{
"cve": "CVE-2024-21125",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21125",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21125.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21125"
},
{
"cve": "CVE-2024-21127",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21127",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21127.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21127"
},
{
"cve": "CVE-2024-21129",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21129"
},
{
"cve": "CVE-2024-21130",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21130"
},
{
"cve": "CVE-2024-21134",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21134",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21134.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21134"
},
{
"cve": "CVE-2024-21135",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21135"
},
{
"cve": "CVE-2024-21137",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21137"
},
{
"cve": "CVE-2024-21142",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21142",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21142.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21142"
},
{
"cve": "CVE-2024-21157",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21157",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21157.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21157"
},
{
"cve": "CVE-2024-21159",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21159",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21159.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21159"
},
{
"cve": "CVE-2024-21160",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21160"
},
{
"cve": "CVE-2024-21162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21162"
},
{
"cve": "CVE-2024-21163",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21163"
},
{
"cve": "CVE-2024-21165",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21165.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21165"
},
{
"cve": "CVE-2024-21166",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21166",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21166.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21166"
},
{
"cve": "CVE-2024-21170",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21170"
},
{
"cve": "CVE-2024-21171",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21171"
},
{
"cve": "CVE-2024-21173",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21173",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21173.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21173"
},
{
"cve": "CVE-2024-21176",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21176"
},
{
"cve": "CVE-2024-21177",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21177",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21177.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21177"
},
{
"cve": "CVE-2024-21179",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21179",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21179.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21179"
},
{
"cve": "CVE-2024-21185",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21185",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21185"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-25062"
}
]
}
ncsc-2024-0303
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Er zijn kwetsbaarheden verholpen in Oracle MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24112"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20996"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21125"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21127"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21130"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21134"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21135"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21137"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21142"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21157"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21159"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21160"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21162"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21163"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21165"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21166"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21170"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21171"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21173"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21176"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21177"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21179"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
},
{
"category": "external",
"summary": "Reference - oracle",
"url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ibm; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-07-17T13:54:56.036488Z",
"id": "NCSC-2024-0303",
"initial_release_date": "2024-07-17T13:54:56.036488Z",
"revision_history": [
{
"date": "2024-07-17T13:54:56.036488Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-611599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-912112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-1503309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-764939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-912115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912117",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-611602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503657",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503659",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-1503321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93462",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93461",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93336",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-94333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-248612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-716944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-912999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:9.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-24112",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24112.json"
}
],
"title": "CVE-2021-24112"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-20996",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-20996"
},
{
"cve": "CVE-2024-21125",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21125",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21125.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21125"
},
{
"cve": "CVE-2024-21127",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21127",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21127.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21127"
},
{
"cve": "CVE-2024-21129",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21129"
},
{
"cve": "CVE-2024-21130",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21130"
},
{
"cve": "CVE-2024-21134",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21134",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21134.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21134"
},
{
"cve": "CVE-2024-21135",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21135"
},
{
"cve": "CVE-2024-21137",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21137"
},
{
"cve": "CVE-2024-21142",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21142",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21142.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21142"
},
{
"cve": "CVE-2024-21157",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21157",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21157.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21157"
},
{
"cve": "CVE-2024-21159",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21159",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21159.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21159"
},
{
"cve": "CVE-2024-21160",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21160"
},
{
"cve": "CVE-2024-21162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21162"
},
{
"cve": "CVE-2024-21163",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21163"
},
{
"cve": "CVE-2024-21165",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21165.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21165"
},
{
"cve": "CVE-2024-21166",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21166",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21166.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21166"
},
{
"cve": "CVE-2024-21170",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21170"
},
{
"cve": "CVE-2024-21171",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21171"
},
{
"cve": "CVE-2024-21173",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21173",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21173.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21173"
},
{
"cve": "CVE-2024-21176",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21176"
},
{
"cve": "CVE-2024-21177",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21177",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21177.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21177"
},
{
"cve": "CVE-2024-21179",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21179",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21179.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21179"
},
{
"cve": "CVE-2024-21185",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21185",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21185"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-25062"
}
]
}
ghsa-rxg9-xrhp-64gj
Vulnerability from github
A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701.
{
"affected": [
{
"package": {
"ecosystem": "NuGet",
"name": "System.Drawing.Common"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0"
},
{
"fixed": "4.7.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "System.Drawing.Common"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.0.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-24112"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2022-10-25T17:35:53Z",
"nvd_published_at": "2021-02-25T23:15:00Z",
"severity": "CRITICAL"
},
"details": "A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701.",
"id": "GHSA-rxg9-xrhp-64gj",
"modified": "2022-10-25T17:35:53Z",
"published": "2022-05-24T17:43:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24112"
},
{
"type": "WEB",
"url": "https://github.com/dotnet/announcements/issues/176"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": ".NET Core Remote Code Execution Vulnerability"
}
gsd-2021-24112
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-24112",
"description": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26701.",
"id": "GSD-2021-24112",
"references": [
"https://www.suse.com/security/cve/CVE-2021-24112.html",
"https://security.archlinux.org/CVE-2021-24112"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-24112"
],
"details": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26701.",
"id": "GSD-2021-24112",
"modified": "2023-12-13T01:23:37.893096Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2021-24112",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Visual Studio 2019 for Mac",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "8.0.0",
"version_value": "publication"
}
]
}
},
{
"product_name": "Mono 6.12.0",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "6.12.0",
"version_value": "publication"
}
]
}
},
{
"product_name": ".NET Core 2.1",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "2.1",
"version_value": "publication"
}
]
}
},
{
"product_name": ".NET Core 3.1",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "3.1",
"version_value": "publication"
}
]
}
},
{
"product_name": ".NET 5.0",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "5.0.0",
"version_value": "publication"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": ".NET Core Remote Code Execution Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[4.0.0,4.7.2),[5.0.0,5.0.3)",
"affected_versions": "All versions starting from 4.0.0 before 4.7.2, all versions starting from 5.0.0 before 5.0.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-78",
"CWE-937"
],
"date": "2022-10-25",
"description": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26701.",
"fixed_versions": [
"4.7.2",
"5.0.3"
],
"identifier": "CVE-2021-24112",
"identifiers": [
"GHSA-rxg9-xrhp-64gj",
"CVE-2021-24112"
],
"not_impacted": "All versions before 4.0.0, all versions starting from 4.7.2 before 5.0.0, all versions starting from 5.0.3",
"package_slug": "nuget/System.Drawing.Common",
"pubdate": "2022-05-24",
"solution": "Upgrade to versions 4.7.2, 5.0.3 or above.",
"title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-24112",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112",
"https://github.com/dotnet/announcements/issues/176",
"https://github.com/advisories/GHSA-rxg9-xrhp-64gj"
],
"uuid": "5a349097-3806-4aac-9c1c-73b69ee26fd7"
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8797E7EA-A66B-4B9C-AA2A-DAB08A8A16DB",
"versionEndIncluding": "5.0.2",
"versionStartIncluding": "5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5D87DA-378D-4457-986B-8A0796ED00EB",
"versionEndIncluding": "2.1.24",
"versionStartIncluding": "2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B672ED7-CB65-4D0E-AD4B-4508C4FA8C92",
"versionEndIncluding": "3.1.11",
"versionStartIncluding": "3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:mono:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B46EB9C9-0D62-4F64-9C74-1F372F1543A8",
"versionEndExcluding": "6.12.0.122",
"versionStartIncluding": "6.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:*",
"matchCriteriaId": "21FE380F-7A47-4C72-8F07-526226531175",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": ".NET Core Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Una Vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota de .NET Core. Este ID de CVE es diferente de CVE-2021-26701"
}
],
"id": "CVE-2021-24112",
"lastModified": "2023-12-29T17:15:59.173",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2021-02-25T23:15:16.570",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
fkie_cve-2021-24112
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8797E7EA-A66B-4B9C-AA2A-DAB08A8A16DB",
"versionEndIncluding": "5.0.2",
"versionStartIncluding": "5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5D87DA-378D-4457-986B-8A0796ED00EB",
"versionEndIncluding": "2.1.24",
"versionStartIncluding": "2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B672ED7-CB65-4D0E-AD4B-4508C4FA8C92",
"versionEndIncluding": "3.1.11",
"versionStartIncluding": "3.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:mono:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B46EB9C9-0D62-4F64-9C74-1F372F1543A8",
"versionEndExcluding": "6.12.0.122",
"versionStartIncluding": "6.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:*",
"matchCriteriaId": "21FE380F-7A47-4C72-8F07-526226531175",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ".NET Core Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Una Vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota de .NET Core. Este ID de CVE es diferente de CVE-2021-26701"
}
],
"id": "CVE-2021-24112",
"lastModified": "2024-11-21T05:52:22.857",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2021-02-25T23:15:16.570",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.