Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-1874 (GCVE-0-2024-1874)
Vulnerability from cvelistv5
- CWE-116 - Improper Encoding or Escaping of Output
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "php",
"vendor": "php_group",
"versions": [
{
"status": "affected",
"version": "8.1.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "php",
"vendor": "php_group",
"versions": [
{
"status": "affected",
"version": "8.2.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "php",
"vendor": "php_group",
"versions": [
{
"status": "affected",
"version": "8.3.0"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1874",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-29T13:05:18.510843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:00:58.913Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-19T07:32:26.967Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240510-0009/"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/07/1"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"
},
{
"url": "https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"platforms": [
"Windows"
],
"product": "PHP",
"vendor": "PHP Group",
"versions": [
{
"lessThan": "8.1.28",
"status": "affected",
"version": "8.1.*",
"versionType": "semver"
},
{
"lessThan": "8.2.18",
"status": "affected",
"version": "8.2.*",
"versionType": "semver"
},
{
"lessThan": "8.3.5",
"status": "affected",
"version": "8.3.*",
"versionType": "semver"
}
]
}
],
"configurations": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This problem only present in Windows versions of PHP.\u0026nbsp;"
}
],
"value": "This problem only present in Windows versions of PHP."
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "RyotaK"
}
],
"datePublic": "2024-04-11T17:15:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eIn PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u0026nbsp;\u003c/p\u003e"
}
],
"value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-116",
"description": "CWE-116 Improper Encoding or Escaping of Output",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-13T04:06:17.168Z",
"orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b",
"shortName": "php"
},
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240510-0009/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/07/1"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"
}
],
"source": {
"advisory": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254",
"discovery": "EXTERNAL"
},
"title": "Command injection via array-ish $command parameter of proc_open()",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Using proc_open() string syntax avoids the problem.\u0026nbsp;"
}
],
"value": "Using proc_open() string syntax avoids the problem."
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b",
"assignerShortName": "php",
"cveId": "CVE-2024-1874",
"datePublished": "2024-04-29T03:57:35.624Z",
"dateReserved": "2024-02-25T04:39:00.479Z",
"dateUpdated": "2025-02-13T17:32:26.388Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-1874\",\"sourceIdentifier\":\"security@php.net\",\"published\":\"2024-04-29T04:15:07.580\",\"lastModified\":\"2025-06-18T21:12:24.433\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\"},{\"lang\":\"es\",\"value\":\"En las versiones de PHP 8.1.* anteriores a 8.1.28, 8.2.* anteriores a 8.2.18, 8.3.* anteriores a 8.3.5, cuando se utiliza el comando proc_open() con sintaxis de matriz, debido a un escape insuficiente, si los argumentos del comando ejecutado son controlado por un usuario malintencionado, el usuario puede proporcionar argumentos que ejecutar\u00edan comandos arbitrarios en el shell de Windows.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@php.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"security@php.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.1.0\",\"versionEndExcluding\":\"8.1.28\",\"matchCriteriaId\":\"A888D1BE-9D93-4707-AA45-61EF1DB5488C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndExcluding\":\"8.2.18\",\"matchCriteriaId\":\"6AC1B000-D5C4-49E9-8EFE-8C5C8FF50AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.3.0\",\"versionEndExcluding\":\"8.3.5\",\"matchCriteriaId\":\"BE619987-797E-493B-B089-2E1CADDA9C47\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2024/04/12/11\",\"source\":\"security@php.net\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/07/1\",\"source\":\"security@php.net\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7\",\"source\":\"security@php.net\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/\",\"source\":\"security@php.net\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/\",\"source\":\"security@php.net\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240510-0009/\",\"source\":\"security@php.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/04/12/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/06/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240510-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/04/12/11\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240510-0009/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/07/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-19T07:32:26.967Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-1874\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-29T13:05:18.510843Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"php_group\", \"product\": \"php\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*\"], \"vendor\": \"php_group\", \"product\": \"php\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.2.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*\"], \"vendor\": \"php_group\", \"product\": \"php\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.3.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-29T13:09:16.021Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Command injection via array-ish $command parameter of proc_open()\", \"source\": {\"advisory\": \"https://github.com/php/php-src/security/advisories/GHSA-pc52-254\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"RyotaK\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"PHP Group\", \"product\": \"PHP\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1.*\", \"lessThan\": \"8.1.28\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.2.*\", \"lessThan\": \"8.2.18\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.3.*\", \"lessThan\": \"8.3.5\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2024-04-11T17:15:00.000Z\", \"references\": [{\"url\": \"https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/04/12/11\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240510-0009/\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/06/07/1\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Using proc_open() string syntax avoids the problem.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Using proc_open() string syntax avoids the problem.\u0026nbsp;\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eIn PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u0026nbsp;\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-116\", \"description\": \"CWE-116 Improper Encoding or Escaping of Output\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"This problem only present in Windows versions of PHP.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"This problem only present in Windows versions of PHP.\u0026nbsp;\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dd77f84a-d19a-4638-8c3d-a322d820ed2b\", \"shortName\": \"php\", \"dateUpdated\": \"2024-06-13T04:06:17.168Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-1874\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T17:32:26.388Z\", \"dateReserved\": \"2024-02-25T04:39:00.479Z\", \"assignerOrgId\": \"dd77f84a-d19a-4638-8c3d-a322d820ed2b\", \"datePublished\": \"2024-04-29T03:57:35.624Z\", \"assignerShortName\": \"php\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-0867
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in PHP ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0867 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0867.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0867 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0867"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.1/releases/8.1.28"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.2/releases/8.2.18"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.3/releases/8.3.6"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5661 vom 2024-04-15",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00069.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5660 vom 2024-04-15",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00068.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1444-1 vom 2024-04-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BASFW3ZS5T33OQ6TWU672VCOJR5SSESM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1446-1 vom 2024-04-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6D6UI3AE3T6YUE6R3EXQ2NFFKLTJVRH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1445-1 vom 2024-04-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018425.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6757-1 vom 2024-04-29",
"url": "https://ubuntu.com/security/notices/USN-6757-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6757-2 vom 2024-05-02",
"url": "https://ubuntu.com/security/notices/USN-6757-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3810 vom 2024-05-08",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASPHP8.2-2024-004 vom 2024-05-30",
"url": "https://alas.aws.amazon.com/AL2/ALASPHP8.2-2024-004.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-52C23EF1EC vom 2024-06-04",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-52c23ef1ec"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-49ABA7B305 vom 2024-06-04",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-49aba7b305"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2037-1 vom 2024-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018728.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASPHP8.1-2024-005 vom 2024-06-25",
"url": "https://alas.aws.amazon.com/AL2/ALASPHP8.1-2024-005.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202408-32 vom 2024-08-12",
"url": "https://security.gentoo.org/glsa/202408-32"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10951 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10951"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10949 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10949"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10950 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10952 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10952"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10951 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10951.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10949 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10949.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10950 vom 2024-12-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-10950.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10952 vom 2024-12-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-10952.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10951 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10951"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10950 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10950"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10949 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10949"
}
],
"source_lang": "en-US",
"title": "PHP: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-18T23:00:00.000+00:00",
"generator": {
"date": "2024-12-19T09:19:41.873+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-0867",
"initial_release_date": "2024-04-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-04-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-04-25T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-02T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1.28",
"product": {
"name": "Open Source PHP \u003c8.1.28",
"product_id": "T034095"
}
},
{
"category": "product_version",
"name": "8.1.28",
"product": {
"name": "Open Source PHP 8.1.28",
"product_id": "T034095-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.1.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.6",
"product": {
"name": "Open Source PHP \u003c8.3.6",
"product_id": "T034096"
}
},
{
"category": "product_version",
"name": "8.3.6",
"product": {
"name": "Open Source PHP 8.3.6",
"product_id": "T034096-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.3.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.18",
"product": {
"name": "Open Source PHP \u003c8.2.18",
"product_id": "T034097"
}
},
{
"category": "product_version",
"name": "8.2.18",
"product": {
"name": "Open Source PHP 8.2.18",
"product_id": "T034097-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.2.18"
}
}
}
],
"category": "product_name",
"name": "PHP"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1874",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2756",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-2756"
},
{
"cve": "CVE-2024-2757",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-2757"
},
{
"cve": "CVE-2024-3096",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-3096"
}
]
}
wid-sec-w-2024-0867
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "PHP ist eine Programmiersprache, die zur Implementierung von Web-Applikationen genutzt wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in PHP ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0867 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0867.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0867 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0867"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.1/releases/8.1.28"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.2/releases/8.2.18"
},
{
"category": "external",
"summary": "PHP Changelog vom 2024-04-11",
"url": "https://php.watch/versions/8.3/releases/8.3.6"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5661 vom 2024-04-15",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00069.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5660 vom 2024-04-15",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00068.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1444-1 vom 2024-04-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BASFW3ZS5T33OQ6TWU672VCOJR5SSESM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1446-1 vom 2024-04-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6D6UI3AE3T6YUE6R3EXQ2NFFKLTJVRH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:1445-1 vom 2024-04-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018425.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6757-1 vom 2024-04-29",
"url": "https://ubuntu.com/security/notices/USN-6757-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6757-2 vom 2024-05-02",
"url": "https://ubuntu.com/security/notices/USN-6757-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3810 vom 2024-05-08",
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASPHP8.2-2024-004 vom 2024-05-30",
"url": "https://alas.aws.amazon.com/AL2/ALASPHP8.2-2024-004.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-52C23EF1EC vom 2024-06-04",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-52c23ef1ec"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-49ABA7B305 vom 2024-06-04",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-49aba7b305"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2037-1 vom 2024-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018728.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASPHP8.1-2024-005 vom 2024-06-25",
"url": "https://alas.aws.amazon.com/AL2/ALASPHP8.1-2024-005.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202408-32 vom 2024-08-12",
"url": "https://security.gentoo.org/glsa/202408-32"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-017 vom 2024-11-21",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2024/11/Xerox-Security-Bulletin-XRX24-017-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10951 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10951"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10949 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10949"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10950 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10952 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10952"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10951 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10951.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10949 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10949.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10950 vom 2024-12-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-10950.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10952 vom 2024-12-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-10952.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10951 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10951"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10950 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10950"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10949 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10949"
}
],
"source_lang": "en-US",
"title": "PHP: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-18T23:00:00.000+00:00",
"generator": {
"date": "2024-12-19T09:19:41.873+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-0867",
"initial_release_date": "2024-04-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-04-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-04-25T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-02T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-06-04T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-06-24T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1.28",
"product": {
"name": "Open Source PHP \u003c8.1.28",
"product_id": "T034095"
}
},
{
"category": "product_version",
"name": "8.1.28",
"product": {
"name": "Open Source PHP 8.1.28",
"product_id": "T034095-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.1.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.6",
"product": {
"name": "Open Source PHP \u003c8.3.6",
"product_id": "T034096"
}
},
{
"category": "product_version",
"name": "8.3.6",
"product": {
"name": "Open Source PHP 8.3.6",
"product_id": "T034096-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.3.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.2.18",
"product": {
"name": "Open Source PHP \u003c8.2.18",
"product_id": "T034097"
}
},
{
"category": "product_version",
"name": "8.2.18",
"product": {
"name": "Open Source PHP 8.2.18",
"product_id": "T034097-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:php:php:8.2.18"
}
}
}
],
"category": "product_name",
"name": "PHP"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1874",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2756",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-2756"
},
{
"cve": "CVE-2024-2757",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-2757"
},
{
"cve": "CVE-2024-3096",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in PHP. Diese Fehler bestehen aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung, einem unzureichenden Fix einer \u00e4lteren Schwachstellen, einer falschen Handhabung von HTTP-Variablen und eines Problems der Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"67646",
"T015632",
"T034097",
"T012167",
"T034096",
"T004914",
"T032255",
"74185",
"2951",
"T002207",
"T034095",
"T000126",
"398363"
]
},
"release_date": "2024-04-11T22:00:00.000+00:00",
"title": "CVE-2024-3096"
}
]
}
opensuse-su-2024:13867-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "php8-8.3.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the php8-8.3.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13867",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13867-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-1874 page",
"url": "https://www.suse.com/security/cve/CVE-2024-1874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2757 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3096 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3096/"
}
],
"title": "php8-8.3.6-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13867-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "php8-8.3.6-1.1.aarch64",
"product": {
"name": "php8-8.3.6-1.1.aarch64",
"product_id": "php8-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-bcmath-8.3.6-1.1.aarch64",
"product": {
"name": "php8-bcmath-8.3.6-1.1.aarch64",
"product_id": "php8-bcmath-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-bz2-8.3.6-1.1.aarch64",
"product": {
"name": "php8-bz2-8.3.6-1.1.aarch64",
"product_id": "php8-bz2-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-calendar-8.3.6-1.1.aarch64",
"product": {
"name": "php8-calendar-8.3.6-1.1.aarch64",
"product_id": "php8-calendar-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-cli-8.3.6-1.1.aarch64",
"product": {
"name": "php8-cli-8.3.6-1.1.aarch64",
"product_id": "php8-cli-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-ctype-8.3.6-1.1.aarch64",
"product": {
"name": "php8-ctype-8.3.6-1.1.aarch64",
"product_id": "php8-ctype-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-curl-8.3.6-1.1.aarch64",
"product": {
"name": "php8-curl-8.3.6-1.1.aarch64",
"product_id": "php8-curl-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-dba-8.3.6-1.1.aarch64",
"product": {
"name": "php8-dba-8.3.6-1.1.aarch64",
"product_id": "php8-dba-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-devel-8.3.6-1.1.aarch64",
"product": {
"name": "php8-devel-8.3.6-1.1.aarch64",
"product_id": "php8-devel-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-dom-8.3.6-1.1.aarch64",
"product": {
"name": "php8-dom-8.3.6-1.1.aarch64",
"product_id": "php8-dom-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-enchant-8.3.6-1.1.aarch64",
"product": {
"name": "php8-enchant-8.3.6-1.1.aarch64",
"product_id": "php8-enchant-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-exif-8.3.6-1.1.aarch64",
"product": {
"name": "php8-exif-8.3.6-1.1.aarch64",
"product_id": "php8-exif-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-ffi-8.3.6-1.1.aarch64",
"product": {
"name": "php8-ffi-8.3.6-1.1.aarch64",
"product_id": "php8-ffi-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-fileinfo-8.3.6-1.1.aarch64",
"product": {
"name": "php8-fileinfo-8.3.6-1.1.aarch64",
"product_id": "php8-fileinfo-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-ftp-8.3.6-1.1.aarch64",
"product": {
"name": "php8-ftp-8.3.6-1.1.aarch64",
"product_id": "php8-ftp-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-gd-8.3.6-1.1.aarch64",
"product": {
"name": "php8-gd-8.3.6-1.1.aarch64",
"product_id": "php8-gd-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-gettext-8.3.6-1.1.aarch64",
"product": {
"name": "php8-gettext-8.3.6-1.1.aarch64",
"product_id": "php8-gettext-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-gmp-8.3.6-1.1.aarch64",
"product": {
"name": "php8-gmp-8.3.6-1.1.aarch64",
"product_id": "php8-gmp-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-iconv-8.3.6-1.1.aarch64",
"product": {
"name": "php8-iconv-8.3.6-1.1.aarch64",
"product_id": "php8-iconv-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-intl-8.3.6-1.1.aarch64",
"product": {
"name": "php8-intl-8.3.6-1.1.aarch64",
"product_id": "php8-intl-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-ldap-8.3.6-1.1.aarch64",
"product": {
"name": "php8-ldap-8.3.6-1.1.aarch64",
"product_id": "php8-ldap-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-mbstring-8.3.6-1.1.aarch64",
"product": {
"name": "php8-mbstring-8.3.6-1.1.aarch64",
"product_id": "php8-mbstring-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-mysql-8.3.6-1.1.aarch64",
"product": {
"name": "php8-mysql-8.3.6-1.1.aarch64",
"product_id": "php8-mysql-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-odbc-8.3.6-1.1.aarch64",
"product": {
"name": "php8-odbc-8.3.6-1.1.aarch64",
"product_id": "php8-odbc-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-opcache-8.3.6-1.1.aarch64",
"product": {
"name": "php8-opcache-8.3.6-1.1.aarch64",
"product_id": "php8-opcache-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-openssl-8.3.6-1.1.aarch64",
"product": {
"name": "php8-openssl-8.3.6-1.1.aarch64",
"product_id": "php8-openssl-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-pcntl-8.3.6-1.1.aarch64",
"product": {
"name": "php8-pcntl-8.3.6-1.1.aarch64",
"product_id": "php8-pcntl-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-pdo-8.3.6-1.1.aarch64",
"product": {
"name": "php8-pdo-8.3.6-1.1.aarch64",
"product_id": "php8-pdo-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-pgsql-8.3.6-1.1.aarch64",
"product": {
"name": "php8-pgsql-8.3.6-1.1.aarch64",
"product_id": "php8-pgsql-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-phar-8.3.6-1.1.aarch64",
"product": {
"name": "php8-phar-8.3.6-1.1.aarch64",
"product_id": "php8-phar-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-posix-8.3.6-1.1.aarch64",
"product": {
"name": "php8-posix-8.3.6-1.1.aarch64",
"product_id": "php8-posix-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-readline-8.3.6-1.1.aarch64",
"product": {
"name": "php8-readline-8.3.6-1.1.aarch64",
"product_id": "php8-readline-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-shmop-8.3.6-1.1.aarch64",
"product": {
"name": "php8-shmop-8.3.6-1.1.aarch64",
"product_id": "php8-shmop-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-snmp-8.3.6-1.1.aarch64",
"product": {
"name": "php8-snmp-8.3.6-1.1.aarch64",
"product_id": "php8-snmp-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-soap-8.3.6-1.1.aarch64",
"product": {
"name": "php8-soap-8.3.6-1.1.aarch64",
"product_id": "php8-soap-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sockets-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sockets-8.3.6-1.1.aarch64",
"product_id": "php8-sockets-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sodium-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sodium-8.3.6-1.1.aarch64",
"product_id": "php8-sodium-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sqlite-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sqlite-8.3.6-1.1.aarch64",
"product_id": "php8-sqlite-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sysvmsg-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sysvmsg-8.3.6-1.1.aarch64",
"product_id": "php8-sysvmsg-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sysvsem-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sysvsem-8.3.6-1.1.aarch64",
"product_id": "php8-sysvsem-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-sysvshm-8.3.6-1.1.aarch64",
"product": {
"name": "php8-sysvshm-8.3.6-1.1.aarch64",
"product_id": "php8-sysvshm-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-tidy-8.3.6-1.1.aarch64",
"product": {
"name": "php8-tidy-8.3.6-1.1.aarch64",
"product_id": "php8-tidy-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-tokenizer-8.3.6-1.1.aarch64",
"product": {
"name": "php8-tokenizer-8.3.6-1.1.aarch64",
"product_id": "php8-tokenizer-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-xmlreader-8.3.6-1.1.aarch64",
"product": {
"name": "php8-xmlreader-8.3.6-1.1.aarch64",
"product_id": "php8-xmlreader-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-xmlwriter-8.3.6-1.1.aarch64",
"product": {
"name": "php8-xmlwriter-8.3.6-1.1.aarch64",
"product_id": "php8-xmlwriter-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-xsl-8.3.6-1.1.aarch64",
"product": {
"name": "php8-xsl-8.3.6-1.1.aarch64",
"product_id": "php8-xsl-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-zip-8.3.6-1.1.aarch64",
"product": {
"name": "php8-zip-8.3.6-1.1.aarch64",
"product_id": "php8-zip-8.3.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "php8-zlib-8.3.6-1.1.aarch64",
"product": {
"name": "php8-zlib-8.3.6-1.1.aarch64",
"product_id": "php8-zlib-8.3.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "php8-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-8.3.6-1.1.ppc64le",
"product_id": "php8-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-bcmath-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-bcmath-8.3.6-1.1.ppc64le",
"product_id": "php8-bcmath-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-bz2-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-bz2-8.3.6-1.1.ppc64le",
"product_id": "php8-bz2-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-calendar-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-calendar-8.3.6-1.1.ppc64le",
"product_id": "php8-calendar-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-cli-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-cli-8.3.6-1.1.ppc64le",
"product_id": "php8-cli-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-ctype-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-ctype-8.3.6-1.1.ppc64le",
"product_id": "php8-ctype-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-curl-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-curl-8.3.6-1.1.ppc64le",
"product_id": "php8-curl-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-dba-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-dba-8.3.6-1.1.ppc64le",
"product_id": "php8-dba-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-devel-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-devel-8.3.6-1.1.ppc64le",
"product_id": "php8-devel-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-dom-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-dom-8.3.6-1.1.ppc64le",
"product_id": "php8-dom-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-enchant-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-enchant-8.3.6-1.1.ppc64le",
"product_id": "php8-enchant-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-exif-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-exif-8.3.6-1.1.ppc64le",
"product_id": "php8-exif-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-ffi-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-ffi-8.3.6-1.1.ppc64le",
"product_id": "php8-ffi-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-fileinfo-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-fileinfo-8.3.6-1.1.ppc64le",
"product_id": "php8-fileinfo-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-ftp-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-ftp-8.3.6-1.1.ppc64le",
"product_id": "php8-ftp-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-gd-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-gd-8.3.6-1.1.ppc64le",
"product_id": "php8-gd-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-gettext-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-gettext-8.3.6-1.1.ppc64le",
"product_id": "php8-gettext-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-gmp-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-gmp-8.3.6-1.1.ppc64le",
"product_id": "php8-gmp-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-iconv-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-iconv-8.3.6-1.1.ppc64le",
"product_id": "php8-iconv-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-intl-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-intl-8.3.6-1.1.ppc64le",
"product_id": "php8-intl-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-ldap-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-ldap-8.3.6-1.1.ppc64le",
"product_id": "php8-ldap-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-mbstring-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-mbstring-8.3.6-1.1.ppc64le",
"product_id": "php8-mbstring-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-mysql-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-mysql-8.3.6-1.1.ppc64le",
"product_id": "php8-mysql-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-odbc-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-odbc-8.3.6-1.1.ppc64le",
"product_id": "php8-odbc-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-opcache-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-opcache-8.3.6-1.1.ppc64le",
"product_id": "php8-opcache-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-openssl-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-openssl-8.3.6-1.1.ppc64le",
"product_id": "php8-openssl-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-pcntl-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-pcntl-8.3.6-1.1.ppc64le",
"product_id": "php8-pcntl-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-pdo-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-pdo-8.3.6-1.1.ppc64le",
"product_id": "php8-pdo-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-pgsql-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-pgsql-8.3.6-1.1.ppc64le",
"product_id": "php8-pgsql-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-phar-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-phar-8.3.6-1.1.ppc64le",
"product_id": "php8-phar-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-posix-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-posix-8.3.6-1.1.ppc64le",
"product_id": "php8-posix-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-readline-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-readline-8.3.6-1.1.ppc64le",
"product_id": "php8-readline-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-shmop-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-shmop-8.3.6-1.1.ppc64le",
"product_id": "php8-shmop-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-snmp-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-snmp-8.3.6-1.1.ppc64le",
"product_id": "php8-snmp-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-soap-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-soap-8.3.6-1.1.ppc64le",
"product_id": "php8-soap-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sockets-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sockets-8.3.6-1.1.ppc64le",
"product_id": "php8-sockets-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sodium-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sodium-8.3.6-1.1.ppc64le",
"product_id": "php8-sodium-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sqlite-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sqlite-8.3.6-1.1.ppc64le",
"product_id": "php8-sqlite-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sysvmsg-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sysvmsg-8.3.6-1.1.ppc64le",
"product_id": "php8-sysvmsg-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sysvsem-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sysvsem-8.3.6-1.1.ppc64le",
"product_id": "php8-sysvsem-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-sysvshm-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-sysvshm-8.3.6-1.1.ppc64le",
"product_id": "php8-sysvshm-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-tidy-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-tidy-8.3.6-1.1.ppc64le",
"product_id": "php8-tidy-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-tokenizer-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-tokenizer-8.3.6-1.1.ppc64le",
"product_id": "php8-tokenizer-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-xmlreader-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-xmlreader-8.3.6-1.1.ppc64le",
"product_id": "php8-xmlreader-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-xmlwriter-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-xmlwriter-8.3.6-1.1.ppc64le",
"product_id": "php8-xmlwriter-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-xsl-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-xsl-8.3.6-1.1.ppc64le",
"product_id": "php8-xsl-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-zip-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-zip-8.3.6-1.1.ppc64le",
"product_id": "php8-zip-8.3.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "php8-zlib-8.3.6-1.1.ppc64le",
"product": {
"name": "php8-zlib-8.3.6-1.1.ppc64le",
"product_id": "php8-zlib-8.3.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "php8-8.3.6-1.1.s390x",
"product": {
"name": "php8-8.3.6-1.1.s390x",
"product_id": "php8-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-bcmath-8.3.6-1.1.s390x",
"product": {
"name": "php8-bcmath-8.3.6-1.1.s390x",
"product_id": "php8-bcmath-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-bz2-8.3.6-1.1.s390x",
"product": {
"name": "php8-bz2-8.3.6-1.1.s390x",
"product_id": "php8-bz2-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-calendar-8.3.6-1.1.s390x",
"product": {
"name": "php8-calendar-8.3.6-1.1.s390x",
"product_id": "php8-calendar-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-cli-8.3.6-1.1.s390x",
"product": {
"name": "php8-cli-8.3.6-1.1.s390x",
"product_id": "php8-cli-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-ctype-8.3.6-1.1.s390x",
"product": {
"name": "php8-ctype-8.3.6-1.1.s390x",
"product_id": "php8-ctype-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-curl-8.3.6-1.1.s390x",
"product": {
"name": "php8-curl-8.3.6-1.1.s390x",
"product_id": "php8-curl-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-dba-8.3.6-1.1.s390x",
"product": {
"name": "php8-dba-8.3.6-1.1.s390x",
"product_id": "php8-dba-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-devel-8.3.6-1.1.s390x",
"product": {
"name": "php8-devel-8.3.6-1.1.s390x",
"product_id": "php8-devel-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-dom-8.3.6-1.1.s390x",
"product": {
"name": "php8-dom-8.3.6-1.1.s390x",
"product_id": "php8-dom-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-enchant-8.3.6-1.1.s390x",
"product": {
"name": "php8-enchant-8.3.6-1.1.s390x",
"product_id": "php8-enchant-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-exif-8.3.6-1.1.s390x",
"product": {
"name": "php8-exif-8.3.6-1.1.s390x",
"product_id": "php8-exif-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-ffi-8.3.6-1.1.s390x",
"product": {
"name": "php8-ffi-8.3.6-1.1.s390x",
"product_id": "php8-ffi-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-fileinfo-8.3.6-1.1.s390x",
"product": {
"name": "php8-fileinfo-8.3.6-1.1.s390x",
"product_id": "php8-fileinfo-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-ftp-8.3.6-1.1.s390x",
"product": {
"name": "php8-ftp-8.3.6-1.1.s390x",
"product_id": "php8-ftp-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-gd-8.3.6-1.1.s390x",
"product": {
"name": "php8-gd-8.3.6-1.1.s390x",
"product_id": "php8-gd-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-gettext-8.3.6-1.1.s390x",
"product": {
"name": "php8-gettext-8.3.6-1.1.s390x",
"product_id": "php8-gettext-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-gmp-8.3.6-1.1.s390x",
"product": {
"name": "php8-gmp-8.3.6-1.1.s390x",
"product_id": "php8-gmp-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-iconv-8.3.6-1.1.s390x",
"product": {
"name": "php8-iconv-8.3.6-1.1.s390x",
"product_id": "php8-iconv-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-intl-8.3.6-1.1.s390x",
"product": {
"name": "php8-intl-8.3.6-1.1.s390x",
"product_id": "php8-intl-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-ldap-8.3.6-1.1.s390x",
"product": {
"name": "php8-ldap-8.3.6-1.1.s390x",
"product_id": "php8-ldap-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-mbstring-8.3.6-1.1.s390x",
"product": {
"name": "php8-mbstring-8.3.6-1.1.s390x",
"product_id": "php8-mbstring-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-mysql-8.3.6-1.1.s390x",
"product": {
"name": "php8-mysql-8.3.6-1.1.s390x",
"product_id": "php8-mysql-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-odbc-8.3.6-1.1.s390x",
"product": {
"name": "php8-odbc-8.3.6-1.1.s390x",
"product_id": "php8-odbc-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-opcache-8.3.6-1.1.s390x",
"product": {
"name": "php8-opcache-8.3.6-1.1.s390x",
"product_id": "php8-opcache-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-openssl-8.3.6-1.1.s390x",
"product": {
"name": "php8-openssl-8.3.6-1.1.s390x",
"product_id": "php8-openssl-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-pcntl-8.3.6-1.1.s390x",
"product": {
"name": "php8-pcntl-8.3.6-1.1.s390x",
"product_id": "php8-pcntl-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-pdo-8.3.6-1.1.s390x",
"product": {
"name": "php8-pdo-8.3.6-1.1.s390x",
"product_id": "php8-pdo-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-pgsql-8.3.6-1.1.s390x",
"product": {
"name": "php8-pgsql-8.3.6-1.1.s390x",
"product_id": "php8-pgsql-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-phar-8.3.6-1.1.s390x",
"product": {
"name": "php8-phar-8.3.6-1.1.s390x",
"product_id": "php8-phar-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-posix-8.3.6-1.1.s390x",
"product": {
"name": "php8-posix-8.3.6-1.1.s390x",
"product_id": "php8-posix-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-readline-8.3.6-1.1.s390x",
"product": {
"name": "php8-readline-8.3.6-1.1.s390x",
"product_id": "php8-readline-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-shmop-8.3.6-1.1.s390x",
"product": {
"name": "php8-shmop-8.3.6-1.1.s390x",
"product_id": "php8-shmop-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-snmp-8.3.6-1.1.s390x",
"product": {
"name": "php8-snmp-8.3.6-1.1.s390x",
"product_id": "php8-snmp-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-soap-8.3.6-1.1.s390x",
"product": {
"name": "php8-soap-8.3.6-1.1.s390x",
"product_id": "php8-soap-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sockets-8.3.6-1.1.s390x",
"product": {
"name": "php8-sockets-8.3.6-1.1.s390x",
"product_id": "php8-sockets-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sodium-8.3.6-1.1.s390x",
"product": {
"name": "php8-sodium-8.3.6-1.1.s390x",
"product_id": "php8-sodium-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sqlite-8.3.6-1.1.s390x",
"product": {
"name": "php8-sqlite-8.3.6-1.1.s390x",
"product_id": "php8-sqlite-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sysvmsg-8.3.6-1.1.s390x",
"product": {
"name": "php8-sysvmsg-8.3.6-1.1.s390x",
"product_id": "php8-sysvmsg-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sysvsem-8.3.6-1.1.s390x",
"product": {
"name": "php8-sysvsem-8.3.6-1.1.s390x",
"product_id": "php8-sysvsem-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-sysvshm-8.3.6-1.1.s390x",
"product": {
"name": "php8-sysvshm-8.3.6-1.1.s390x",
"product_id": "php8-sysvshm-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-tidy-8.3.6-1.1.s390x",
"product": {
"name": "php8-tidy-8.3.6-1.1.s390x",
"product_id": "php8-tidy-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-tokenizer-8.3.6-1.1.s390x",
"product": {
"name": "php8-tokenizer-8.3.6-1.1.s390x",
"product_id": "php8-tokenizer-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-xmlreader-8.3.6-1.1.s390x",
"product": {
"name": "php8-xmlreader-8.3.6-1.1.s390x",
"product_id": "php8-xmlreader-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-xmlwriter-8.3.6-1.1.s390x",
"product": {
"name": "php8-xmlwriter-8.3.6-1.1.s390x",
"product_id": "php8-xmlwriter-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-xsl-8.3.6-1.1.s390x",
"product": {
"name": "php8-xsl-8.3.6-1.1.s390x",
"product_id": "php8-xsl-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-zip-8.3.6-1.1.s390x",
"product": {
"name": "php8-zip-8.3.6-1.1.s390x",
"product_id": "php8-zip-8.3.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "php8-zlib-8.3.6-1.1.s390x",
"product": {
"name": "php8-zlib-8.3.6-1.1.s390x",
"product_id": "php8-zlib-8.3.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "php8-8.3.6-1.1.x86_64",
"product": {
"name": "php8-8.3.6-1.1.x86_64",
"product_id": "php8-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-bcmath-8.3.6-1.1.x86_64",
"product": {
"name": "php8-bcmath-8.3.6-1.1.x86_64",
"product_id": "php8-bcmath-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-bz2-8.3.6-1.1.x86_64",
"product": {
"name": "php8-bz2-8.3.6-1.1.x86_64",
"product_id": "php8-bz2-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-calendar-8.3.6-1.1.x86_64",
"product": {
"name": "php8-calendar-8.3.6-1.1.x86_64",
"product_id": "php8-calendar-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-cli-8.3.6-1.1.x86_64",
"product": {
"name": "php8-cli-8.3.6-1.1.x86_64",
"product_id": "php8-cli-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-ctype-8.3.6-1.1.x86_64",
"product": {
"name": "php8-ctype-8.3.6-1.1.x86_64",
"product_id": "php8-ctype-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-curl-8.3.6-1.1.x86_64",
"product": {
"name": "php8-curl-8.3.6-1.1.x86_64",
"product_id": "php8-curl-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-dba-8.3.6-1.1.x86_64",
"product": {
"name": "php8-dba-8.3.6-1.1.x86_64",
"product_id": "php8-dba-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-devel-8.3.6-1.1.x86_64",
"product": {
"name": "php8-devel-8.3.6-1.1.x86_64",
"product_id": "php8-devel-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-dom-8.3.6-1.1.x86_64",
"product": {
"name": "php8-dom-8.3.6-1.1.x86_64",
"product_id": "php8-dom-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-enchant-8.3.6-1.1.x86_64",
"product": {
"name": "php8-enchant-8.3.6-1.1.x86_64",
"product_id": "php8-enchant-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-exif-8.3.6-1.1.x86_64",
"product": {
"name": "php8-exif-8.3.6-1.1.x86_64",
"product_id": "php8-exif-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-ffi-8.3.6-1.1.x86_64",
"product": {
"name": "php8-ffi-8.3.6-1.1.x86_64",
"product_id": "php8-ffi-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-fileinfo-8.3.6-1.1.x86_64",
"product": {
"name": "php8-fileinfo-8.3.6-1.1.x86_64",
"product_id": "php8-fileinfo-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-ftp-8.3.6-1.1.x86_64",
"product": {
"name": "php8-ftp-8.3.6-1.1.x86_64",
"product_id": "php8-ftp-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-gd-8.3.6-1.1.x86_64",
"product": {
"name": "php8-gd-8.3.6-1.1.x86_64",
"product_id": "php8-gd-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-gettext-8.3.6-1.1.x86_64",
"product": {
"name": "php8-gettext-8.3.6-1.1.x86_64",
"product_id": "php8-gettext-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-gmp-8.3.6-1.1.x86_64",
"product": {
"name": "php8-gmp-8.3.6-1.1.x86_64",
"product_id": "php8-gmp-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-iconv-8.3.6-1.1.x86_64",
"product": {
"name": "php8-iconv-8.3.6-1.1.x86_64",
"product_id": "php8-iconv-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-intl-8.3.6-1.1.x86_64",
"product": {
"name": "php8-intl-8.3.6-1.1.x86_64",
"product_id": "php8-intl-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-ldap-8.3.6-1.1.x86_64",
"product": {
"name": "php8-ldap-8.3.6-1.1.x86_64",
"product_id": "php8-ldap-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-mbstring-8.3.6-1.1.x86_64",
"product": {
"name": "php8-mbstring-8.3.6-1.1.x86_64",
"product_id": "php8-mbstring-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-mysql-8.3.6-1.1.x86_64",
"product": {
"name": "php8-mysql-8.3.6-1.1.x86_64",
"product_id": "php8-mysql-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-odbc-8.3.6-1.1.x86_64",
"product": {
"name": "php8-odbc-8.3.6-1.1.x86_64",
"product_id": "php8-odbc-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-opcache-8.3.6-1.1.x86_64",
"product": {
"name": "php8-opcache-8.3.6-1.1.x86_64",
"product_id": "php8-opcache-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-openssl-8.3.6-1.1.x86_64",
"product": {
"name": "php8-openssl-8.3.6-1.1.x86_64",
"product_id": "php8-openssl-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-pcntl-8.3.6-1.1.x86_64",
"product": {
"name": "php8-pcntl-8.3.6-1.1.x86_64",
"product_id": "php8-pcntl-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-pdo-8.3.6-1.1.x86_64",
"product": {
"name": "php8-pdo-8.3.6-1.1.x86_64",
"product_id": "php8-pdo-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-pgsql-8.3.6-1.1.x86_64",
"product": {
"name": "php8-pgsql-8.3.6-1.1.x86_64",
"product_id": "php8-pgsql-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-phar-8.3.6-1.1.x86_64",
"product": {
"name": "php8-phar-8.3.6-1.1.x86_64",
"product_id": "php8-phar-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-posix-8.3.6-1.1.x86_64",
"product": {
"name": "php8-posix-8.3.6-1.1.x86_64",
"product_id": "php8-posix-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-readline-8.3.6-1.1.x86_64",
"product": {
"name": "php8-readline-8.3.6-1.1.x86_64",
"product_id": "php8-readline-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-shmop-8.3.6-1.1.x86_64",
"product": {
"name": "php8-shmop-8.3.6-1.1.x86_64",
"product_id": "php8-shmop-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-snmp-8.3.6-1.1.x86_64",
"product": {
"name": "php8-snmp-8.3.6-1.1.x86_64",
"product_id": "php8-snmp-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-soap-8.3.6-1.1.x86_64",
"product": {
"name": "php8-soap-8.3.6-1.1.x86_64",
"product_id": "php8-soap-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sockets-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sockets-8.3.6-1.1.x86_64",
"product_id": "php8-sockets-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sodium-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sodium-8.3.6-1.1.x86_64",
"product_id": "php8-sodium-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sqlite-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sqlite-8.3.6-1.1.x86_64",
"product_id": "php8-sqlite-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sysvmsg-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sysvmsg-8.3.6-1.1.x86_64",
"product_id": "php8-sysvmsg-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sysvsem-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sysvsem-8.3.6-1.1.x86_64",
"product_id": "php8-sysvsem-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-sysvshm-8.3.6-1.1.x86_64",
"product": {
"name": "php8-sysvshm-8.3.6-1.1.x86_64",
"product_id": "php8-sysvshm-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-tidy-8.3.6-1.1.x86_64",
"product": {
"name": "php8-tidy-8.3.6-1.1.x86_64",
"product_id": "php8-tidy-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-tokenizer-8.3.6-1.1.x86_64",
"product": {
"name": "php8-tokenizer-8.3.6-1.1.x86_64",
"product_id": "php8-tokenizer-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-xmlreader-8.3.6-1.1.x86_64",
"product": {
"name": "php8-xmlreader-8.3.6-1.1.x86_64",
"product_id": "php8-xmlreader-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-xmlwriter-8.3.6-1.1.x86_64",
"product": {
"name": "php8-xmlwriter-8.3.6-1.1.x86_64",
"product_id": "php8-xmlwriter-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-xsl-8.3.6-1.1.x86_64",
"product": {
"name": "php8-xsl-8.3.6-1.1.x86_64",
"product_id": "php8-xsl-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-zip-8.3.6-1.1.x86_64",
"product": {
"name": "php8-zip-8.3.6-1.1.x86_64",
"product_id": "php8-zip-8.3.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "php8-zlib-8.3.6-1.1.x86_64",
"product": {
"name": "php8-zlib-8.3.6-1.1.x86_64",
"product_id": "php8-zlib-8.3.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64"
},
"product_reference": "php8-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-8.3.6-1.1.s390x"
},
"product_reference": "php8-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64"
},
"product_reference": "php8-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bcmath-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64"
},
"product_reference": "php8-bcmath-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bcmath-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-bcmath-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bcmath-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x"
},
"product_reference": "php8-bcmath-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bcmath-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64"
},
"product_reference": "php8-bcmath-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bz2-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64"
},
"product_reference": "php8-bz2-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bz2-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-bz2-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bz2-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x"
},
"product_reference": "php8-bz2-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-bz2-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64"
},
"product_reference": "php8-bz2-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-calendar-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64"
},
"product_reference": "php8-calendar-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-calendar-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-calendar-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-calendar-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x"
},
"product_reference": "php8-calendar-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-calendar-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64"
},
"product_reference": "php8-calendar-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-cli-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64"
},
"product_reference": "php8-cli-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-cli-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-cli-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-cli-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x"
},
"product_reference": "php8-cli-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-cli-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64"
},
"product_reference": "php8-cli-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ctype-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64"
},
"product_reference": "php8-ctype-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ctype-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-ctype-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ctype-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x"
},
"product_reference": "php8-ctype-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ctype-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64"
},
"product_reference": "php8-ctype-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-curl-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64"
},
"product_reference": "php8-curl-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-curl-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-curl-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-curl-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x"
},
"product_reference": "php8-curl-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-curl-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64"
},
"product_reference": "php8-curl-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dba-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64"
},
"product_reference": "php8-dba-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dba-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-dba-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dba-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x"
},
"product_reference": "php8-dba-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dba-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64"
},
"product_reference": "php8-dba-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-devel-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64"
},
"product_reference": "php8-devel-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-devel-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-devel-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-devel-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x"
},
"product_reference": "php8-devel-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-devel-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64"
},
"product_reference": "php8-devel-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dom-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64"
},
"product_reference": "php8-dom-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dom-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-dom-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dom-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x"
},
"product_reference": "php8-dom-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-dom-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64"
},
"product_reference": "php8-dom-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-enchant-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64"
},
"product_reference": "php8-enchant-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-enchant-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-enchant-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-enchant-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x"
},
"product_reference": "php8-enchant-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-enchant-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64"
},
"product_reference": "php8-enchant-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-exif-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64"
},
"product_reference": "php8-exif-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-exif-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-exif-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-exif-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x"
},
"product_reference": "php8-exif-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-exif-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64"
},
"product_reference": "php8-exif-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ffi-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64"
},
"product_reference": "php8-ffi-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ffi-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-ffi-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ffi-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x"
},
"product_reference": "php8-ffi-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ffi-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64"
},
"product_reference": "php8-ffi-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-fileinfo-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64"
},
"product_reference": "php8-fileinfo-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-fileinfo-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-fileinfo-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-fileinfo-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x"
},
"product_reference": "php8-fileinfo-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-fileinfo-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64"
},
"product_reference": "php8-fileinfo-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ftp-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64"
},
"product_reference": "php8-ftp-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ftp-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-ftp-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ftp-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x"
},
"product_reference": "php8-ftp-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ftp-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64"
},
"product_reference": "php8-ftp-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gd-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64"
},
"product_reference": "php8-gd-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gd-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-gd-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gd-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x"
},
"product_reference": "php8-gd-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gd-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64"
},
"product_reference": "php8-gd-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gettext-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64"
},
"product_reference": "php8-gettext-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gettext-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-gettext-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gettext-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x"
},
"product_reference": "php8-gettext-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gettext-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64"
},
"product_reference": "php8-gettext-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gmp-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64"
},
"product_reference": "php8-gmp-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gmp-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-gmp-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gmp-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x"
},
"product_reference": "php8-gmp-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-gmp-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64"
},
"product_reference": "php8-gmp-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-iconv-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64"
},
"product_reference": "php8-iconv-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-iconv-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-iconv-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-iconv-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x"
},
"product_reference": "php8-iconv-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-iconv-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64"
},
"product_reference": "php8-iconv-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-intl-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64"
},
"product_reference": "php8-intl-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-intl-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-intl-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-intl-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x"
},
"product_reference": "php8-intl-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-intl-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64"
},
"product_reference": "php8-intl-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ldap-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64"
},
"product_reference": "php8-ldap-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ldap-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-ldap-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ldap-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x"
},
"product_reference": "php8-ldap-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-ldap-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64"
},
"product_reference": "php8-ldap-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mbstring-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64"
},
"product_reference": "php8-mbstring-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mbstring-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-mbstring-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mbstring-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x"
},
"product_reference": "php8-mbstring-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mbstring-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64"
},
"product_reference": "php8-mbstring-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mysql-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64"
},
"product_reference": "php8-mysql-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mysql-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-mysql-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mysql-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x"
},
"product_reference": "php8-mysql-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-mysql-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64"
},
"product_reference": "php8-mysql-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-odbc-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64"
},
"product_reference": "php8-odbc-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-odbc-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-odbc-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-odbc-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x"
},
"product_reference": "php8-odbc-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-odbc-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64"
},
"product_reference": "php8-odbc-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-opcache-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64"
},
"product_reference": "php8-opcache-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-opcache-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-opcache-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-opcache-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x"
},
"product_reference": "php8-opcache-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-opcache-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64"
},
"product_reference": "php8-opcache-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-openssl-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64"
},
"product_reference": "php8-openssl-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-openssl-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-openssl-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-openssl-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x"
},
"product_reference": "php8-openssl-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-openssl-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64"
},
"product_reference": "php8-openssl-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pcntl-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64"
},
"product_reference": "php8-pcntl-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pcntl-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-pcntl-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pcntl-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x"
},
"product_reference": "php8-pcntl-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pcntl-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64"
},
"product_reference": "php8-pcntl-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pdo-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64"
},
"product_reference": "php8-pdo-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pdo-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-pdo-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pdo-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x"
},
"product_reference": "php8-pdo-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pdo-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64"
},
"product_reference": "php8-pdo-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pgsql-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64"
},
"product_reference": "php8-pgsql-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pgsql-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-pgsql-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pgsql-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x"
},
"product_reference": "php8-pgsql-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-pgsql-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64"
},
"product_reference": "php8-pgsql-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-phar-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64"
},
"product_reference": "php8-phar-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-phar-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-phar-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-phar-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x"
},
"product_reference": "php8-phar-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-phar-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64"
},
"product_reference": "php8-phar-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-posix-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64"
},
"product_reference": "php8-posix-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-posix-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-posix-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-posix-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x"
},
"product_reference": "php8-posix-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-posix-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64"
},
"product_reference": "php8-posix-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-readline-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64"
},
"product_reference": "php8-readline-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-readline-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-readline-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-readline-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x"
},
"product_reference": "php8-readline-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-readline-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64"
},
"product_reference": "php8-readline-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-shmop-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64"
},
"product_reference": "php8-shmop-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-shmop-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-shmop-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-shmop-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x"
},
"product_reference": "php8-shmop-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-shmop-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64"
},
"product_reference": "php8-shmop-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-snmp-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64"
},
"product_reference": "php8-snmp-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-snmp-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-snmp-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-snmp-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x"
},
"product_reference": "php8-snmp-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-snmp-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64"
},
"product_reference": "php8-snmp-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-soap-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64"
},
"product_reference": "php8-soap-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-soap-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-soap-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-soap-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x"
},
"product_reference": "php8-soap-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-soap-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64"
},
"product_reference": "php8-soap-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sockets-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sockets-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sockets-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sockets-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sockets-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x"
},
"product_reference": "php8-sockets-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sockets-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sockets-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sodium-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sodium-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sodium-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sodium-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sodium-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x"
},
"product_reference": "php8-sodium-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sodium-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sodium-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sqlite-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sqlite-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sqlite-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sqlite-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sqlite-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x"
},
"product_reference": "php8-sqlite-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sqlite-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sqlite-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvmsg-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sysvmsg-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvmsg-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sysvmsg-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvmsg-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x"
},
"product_reference": "php8-sysvmsg-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvmsg-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sysvmsg-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvsem-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sysvsem-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvsem-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sysvsem-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvsem-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x"
},
"product_reference": "php8-sysvsem-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvsem-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sysvsem-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvshm-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64"
},
"product_reference": "php8-sysvshm-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvshm-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-sysvshm-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvshm-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x"
},
"product_reference": "php8-sysvshm-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-sysvshm-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64"
},
"product_reference": "php8-sysvshm-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tidy-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64"
},
"product_reference": "php8-tidy-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tidy-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-tidy-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tidy-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x"
},
"product_reference": "php8-tidy-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tidy-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64"
},
"product_reference": "php8-tidy-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tokenizer-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64"
},
"product_reference": "php8-tokenizer-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tokenizer-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-tokenizer-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tokenizer-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x"
},
"product_reference": "php8-tokenizer-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-tokenizer-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64"
},
"product_reference": "php8-tokenizer-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlreader-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64"
},
"product_reference": "php8-xmlreader-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlreader-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-xmlreader-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlreader-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x"
},
"product_reference": "php8-xmlreader-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlreader-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64"
},
"product_reference": "php8-xmlreader-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlwriter-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64"
},
"product_reference": "php8-xmlwriter-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlwriter-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-xmlwriter-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlwriter-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x"
},
"product_reference": "php8-xmlwriter-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xmlwriter-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64"
},
"product_reference": "php8-xmlwriter-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xsl-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64"
},
"product_reference": "php8-xsl-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xsl-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-xsl-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xsl-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x"
},
"product_reference": "php8-xsl-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-xsl-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64"
},
"product_reference": "php8-xsl-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zip-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64"
},
"product_reference": "php8-zip-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zip-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-zip-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zip-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x"
},
"product_reference": "php8-zip-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zip-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64"
},
"product_reference": "php8-zip-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zlib-8.3.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64"
},
"product_reference": "php8-zlib-8.3.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zlib-8.3.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le"
},
"product_reference": "php8-zlib-8.3.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zlib-8.3.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x"
},
"product_reference": "php8-zlib-8.3.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "php8-zlib-8.3.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
},
"product_reference": "php8-zlib-8.3.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-31629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31629"
}
],
"notes": [
{
"category": "general",
"text": "In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim\u0027s browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31629",
"url": "https://www.suse.com/security/cve/CVE-2022-31629"
},
{
"category": "external",
"summary": "SUSE Bug 1203870 for CVE-2022-31629",
"url": "https://bugzilla.suse.com/1203870"
},
{
"category": "external",
"summary": "SUSE Bug 1222857 for CVE-2022-31629",
"url": "https://bugzilla.suse.com/1222857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-31629"
},
{
"cve": "CVE-2024-1874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-1874"
}
],
"notes": [
{
"category": "general",
"text": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-1874",
"url": "https://www.suse.com/security/cve/CVE-2024-1874"
},
{
"category": "external",
"summary": "SUSE Bug 1222856 for CVE-2024-1874",
"url": "https://bugzilla.suse.com/1222856"
},
{
"category": "external",
"summary": "SUSE Bug 1226072 for CVE-2024-1874",
"url": "https://bugzilla.suse.com/1226072"
},
{
"category": "external",
"summary": "SUSE Bug 1226073 for CVE-2024-1874",
"url": "https://bugzilla.suse.com/1226073"
},
{
"category": "external",
"summary": "SUSE Bug 1226074 for CVE-2024-1874",
"url": "https://bugzilla.suse.com/1226074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2757"
}
],
"notes": [
{
"category": "general",
"text": "In PHP 8.3.* before 8.3.5, function mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2757",
"url": "https://www.suse.com/security/cve/CVE-2024-2757"
},
{
"category": "external",
"summary": "SUSE Bug 1222855 for CVE-2024-2757",
"url": "https://bugzilla.suse.com/1222855"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2757"
},
{
"cve": "CVE-2024-3096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3096"
}
],
"notes": [
{
"category": "general",
"text": "In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3096",
"url": "https://www.suse.com/security/cve/CVE-2024-3096"
},
{
"category": "external",
"summary": "SUSE Bug 1222858 for CVE-2024-3096",
"url": "https://bugzilla.suse.com/1222858"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:php8-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bcmath-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-bz2-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-calendar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-cli-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ctype-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-curl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dba-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-devel-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-dom-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-enchant-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-exif-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ffi-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-fileinfo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ftp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gd-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gettext-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-gmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-iconv-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-intl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-ldap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mbstring-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-mysql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-odbc-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-opcache-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-openssl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pcntl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pdo-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-pgsql-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-phar-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-posix-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-readline-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-shmop-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-snmp-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-soap-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sockets-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sodium-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sqlite-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvmsg-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvsem-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-sysvshm-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tidy-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-tokenizer-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlreader-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xmlwriter-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-xsl-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zip-8.3.6-1.1.x86_64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.aarch64",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.ppc64le",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.s390x",
"openSUSE Tumbleweed:php8-zlib-8.3.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-3096"
}
]
}
NCSC-2024-0243
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Er zijn kwetsbaarheden verholpen in PHP.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om willekeurige code uit te voeren met rechten van de applicatie.\n\nDe kwetsbaarheid met kenmerk CVE-2024-4577 is feitelijk een herintreding van de kwetsbaarheid met kenmerk CVE-2012-1823. Deze kwetsbaarheid maakt het mogelijk om willekeurige code uit te voeren met rechten van de applicatie middels Command Injection.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "De ontwikkelaars van PHP hebben updates uitgebracht om de kwetsbaarheden te verhelpen in PHP 8.3.8, 8.2.20 en 8.1.29. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4577"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.1.29"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.2.20"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.3.8"
}
],
"title": "Kwetsbaarheden verholpen in PHP",
"tracking": {
"current_release_date": "2024-06-10T07:02:05.106950Z",
"id": "NCSC-2024-0243",
"initial_release_date": "2024-06-10T07:02:05.106950Z",
"revision_history": [
{
"date": "2024-06-10T07:02:05.106950Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.1._:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.2._:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.3._:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "php_group"
},
{
"branches": [
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-220483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-895265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473449",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-294412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-895277",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "php"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-5458",
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-5585"
}
]
}
NCSC-2024-0411
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CWE-18",
"title": "CWE-18"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database producten",
"tracking": {
"current_release_date": "2024-10-17T13:15:19.595269Z",
"id": "NCSC-2024-0411",
"initial_release_date": "2024-10-17T13:15:19.595269Z",
"revision_history": [
{
"date": "2024-10-17T13:15:19.595269Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673504",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_grid",
"product": {
"name": "database_-_grid",
"product_id": "CSAFPID-1673506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_core",
"product": {
"name": "database_-_core",
"product_id": "CSAFPID-1673442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673507",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673509",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_security",
"product": {
"name": "database_-_security",
"product_id": "CSAFPID-1673508",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph_mapviewer",
"product": {
"name": "spatial_and_graph_mapviewer",
"product_id": "CSAFPID-912561",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-764250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673511",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673512",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-816800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "spatial_and_graph",
"product": {
"name": "spatial_and_graph",
"product_id": "CSAFPID-1673529",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning_-_micronaut",
"product": {
"name": "fleet_patching_and_provisioning_-_micronaut",
"product_id": "CSAFPID-1673492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "fleet_patching_and_provisioning",
"product": {
"name": "fleet_patching_and_provisioning",
"product_id": "CSAFPID-1503603",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673445",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673443",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_xml_database",
"product": {
"name": "database_-_xml_database",
"product_id": "CSAFPID-1673444",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "database_-_java_vm",
"product": {
"name": "database_-_java_vm",
"product_id": "CSAFPID-1673452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-816799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-1673525",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912046",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503299",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816361",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912045",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503302",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912044",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-1503306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-912601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "graalvm_for_jdk",
"product": {
"name": "graalvm_for_jdk",
"product_id": "CSAFPID-816854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-816801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sqlcl",
"product": {
"name": "sqlcl",
"product_id": "CSAFPID-1673405",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_administration",
"product": {
"name": "application_express_administration",
"product_id": "CSAFPID-764731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_customers_plugin",
"product": {
"name": "application_express_customers_plugin",
"product_id": "CSAFPID-764732",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express_team_calendar_plugin",
"product": {
"name": "application_express_team_calendar_plugin",
"product_id": "CSAFPID-764733",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-266119",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1503575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "application_express",
"product": {
"name": "application_express",
"product_id": "CSAFPID-1673188",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "autonomous_health_framework",
"product": {
"name": "autonomous_health_framework",
"product_id": "CSAFPID-765239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-764779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "blockchain_platform",
"product": {
"name": "blockchain_platform",
"product_id": "CSAFPID-89587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-765259",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-187448",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-94075",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-220886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-611394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-816317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-912567",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1503612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "essbase",
"product": {
"name": "essbase",
"product_id": "CSAFPID-1673479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_essbase",
"product": {
"name": "oracle_essbase",
"product_id": "CSAFPID-1650506",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-816845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1673404",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data_and_application_adapters",
"product": {
"name": "goldengate_big_data_and_application_adapters",
"product_id": "CSAFPID-1650831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_big_data",
"product": {
"name": "goldengate_big_data",
"product_id": "CSAFPID-764274",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-764752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-1673384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220192",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_stream_analytics",
"product": {
"name": "goldengate_stream_analytics",
"product_id": "CSAFPID-220193",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-816846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-611390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_studio",
"product": {
"name": "goldengate_studio",
"product_id": "CSAFPID-764803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate_veridata",
"product": {
"name": "goldengate_veridata",
"product_id": "CSAFPID-764275",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-342816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-485902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-219912",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1650765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "goldengate",
"product": {
"name": "goldengate",
"product_id": "CSAFPID-1503738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_stream_analytics",
"product": {
"name": "oracle_goldengate_stream_analytics",
"product_id": "CSAFPID-1650515",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-764861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "management_pack_for__goldengate",
"product": {
"name": "management_pack_for__goldengate",
"product_id": "CSAFPID-1503640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate_studio",
"product": {
"name": "oracle_goldengate_studio",
"product_id": "CSAFPID-1650835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_goldengate",
"product": {
"name": "oracle_goldengate",
"product_id": "CSAFPID-1650575",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503661",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1503663",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-764767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1673488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650757",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "nosql_database",
"product": {
"name": "nosql_database",
"product_id": "CSAFPID-1650759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_nosql_database",
"product": {
"name": "oracle_nosql_database",
"product_id": "CSAFPID-1650584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_secure_backup",
"product": {
"name": "oracle_secure_backup",
"product_id": "CSAFPID-1650563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-667692",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-345049",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-611417",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "secure_backup",
"product": {
"name": "secure_backup",
"product_id": "CSAFPID-1673422",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "oracle_sql_developer",
"product": {
"name": "oracle_sql_developer",
"product_id": "CSAFPID-1650638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-764822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-220643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-816871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "sql_developer",
"product": {
"name": "sql_developer",
"product_id": "CSAFPID-1673397",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "oracle_application_express",
"product": {
"name": "oracle_application_express",
"product_id": "CSAFPID-1673144",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle_corporation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-220886",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764822",
"CSAFPID-1650515",
"CSAFPID-1650638",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-89587",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1471",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json"
}
],
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-34169",
"cwe": {
"id": "CWE-192",
"name": "Integer Coercion Error"
},
"notes": [
{
"category": "other",
"text": "Integer Coercion Error",
"title": "CWE-192"
},
{
"category": "other",
"text": "Incorrect Conversion between Numeric Types",
"title": "CWE-681"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34169",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-342816",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-764861",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-219912",
"CSAFPID-765238",
"CSAFPID-765239",
"CSAFPID-765259",
"CSAFPID-667692",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-36033",
"cwe": {
"id": "CWE-87",
"name": "Improper Neutralization of Alternate XSS Syntax"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Alternate XSS Syntax",
"title": "CWE-87"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-36033",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-220886",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764861",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-266119",
"CSAFPID-187448",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-219912",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-667692",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-1503575",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2022-36033"
},
{
"cve": "CVE-2022-37454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-37454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-1650563",
"CSAFPID-89587",
"CSAFPID-764861"
]
}
],
"title": "CVE-2022-37454"
},
{
"cve": "CVE-2022-38136",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-38136",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json"
}
],
"title": "CVE-2022-38136"
},
{
"cve": "CVE-2022-40196",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json"
}
],
"title": "CVE-2022-40196"
},
{
"cve": "CVE-2022-41342",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41342",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json"
}
],
"title": "CVE-2022-41342"
},
{
"cve": "CVE-2022-42919",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-42919",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json"
}
],
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-45061",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-45061",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-342816",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764779",
"CSAFPID-94075",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-611390",
"CSAFPID-764803",
"CSAFPID-764813",
"CSAFPID-764822",
"CSAFPID-89587"
]
}
],
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-46337",
"product_status": {
"known_affected": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-46337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-1673384",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-764752",
"CSAFPID-764275",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-912046",
"CSAFPID-912045",
"CSAFPID-912044",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-764250",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692"
]
}
],
"title": "CVE-2022-46337"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650584",
"CSAFPID-1650835",
"CSAFPID-1650506",
"CSAFPID-1650515",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-342816",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816361",
"CSAFPID-764813",
"CSAFPID-220643",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-89587",
"CSAFPID-1673397",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-345049",
"CSAFPID-816801",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764250",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4043",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4043",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673405",
"CSAFPID-1673397",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-4043"
},
{
"cve": "CVE-2023-4759",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4759",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673397",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-4759"
},
{
"cve": "CVE-2023-4863",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4863",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json"
}
],
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650575",
"CSAFPID-1650515",
"CSAFPID-1650835",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-5072"
},
{
"cve": "CVE-2023-26031",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26031",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-26031"
},
{
"cve": "CVE-2023-26551",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0.0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2023-28484",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-28484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-220886",
"CSAFPID-816317",
"CSAFPID-764813",
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-29469",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29469",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-611417",
"CSAFPID-764731",
"CSAFPID-764732",
"CSAFPID-764733",
"CSAFPID-816317",
"CSAFPID-89587",
"CSAFPID-220886",
"CSAFPID-342816",
"CSAFPID-345049",
"CSAFPID-764752",
"CSAFPID-611390",
"CSAFPID-611394",
"CSAFPID-764764",
"CSAFPID-764765",
"CSAFPID-764766",
"CSAFPID-764767",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764250",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764250",
"CSAFPID-611394",
"CSAFPID-1650584",
"CSAFPID-1673397",
"CSAFPID-912561",
"CSAFPID-345049",
"CSAFPID-611390",
"CSAFPID-611417",
"CSAFPID-764274",
"CSAFPID-764275",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-33201"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-39410",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-39410",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673404",
"CSAFPID-1673384",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871"
]
}
],
"title": "CVE-2023-39410"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-816361",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503603",
"CSAFPID-1503575",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-44981",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650515",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601"
]
}
],
"title": "CVE-2023-44981"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1650765",
"CSAFPID-1650757",
"CSAFPID-1650758",
"CSAFPID-1650767",
"CSAFPID-1650759",
"CSAFPID-1650760",
"CSAFPID-1650761",
"CSAFPID-89587",
"CSAFPID-220643",
"CSAFPID-342816",
"CSAFPID-667692",
"CSAFPID-764250",
"CSAFPID-764813",
"CSAFPID-816317",
"CSAFPID-816361",
"CSAFPID-816798",
"CSAFPID-816799",
"CSAFPID-816800",
"CSAFPID-816801",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-816852",
"CSAFPID-816853",
"CSAFPID-816854",
"CSAFPID-816855",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-816870",
"CSAFPID-816871",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-1503603",
"CSAFPID-1503612",
"CSAFPID-1503575",
"CSAFPID-1503640",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-49083",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-49083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"category": "other",
"text": "Missing Critical Step in Authentication",
"title": "CWE-304"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51384",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-51385",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52426",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52426",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-2408",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-2408"
},
{
"cve": "CVE-2024-2511",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improperly Controlled Sequential Memory Allocation",
"title": "CWE-1325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-2511"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-4603",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4603",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4603"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5458",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673422",
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-5585"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673508",
"CSAFPID-1673525"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673529",
"CSAFPID-1673479",
"CSAFPID-1673511",
"CSAFPID-1673512"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-21131",
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json"
}
],
"title": "CVE-2024-21131"
},
{
"cve": "CVE-2024-21138",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json"
}
],
"title": "CVE-2024-21138"
},
{
"cve": "CVE-2024-21140",
"product_status": {
"known_affected": [
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21140",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json"
}
],
"title": "CVE-2024-21140"
},
{
"cve": "CVE-2024-21144",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json"
}
],
"title": "CVE-2024-21144"
},
{
"cve": "CVE-2024-21145",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503299",
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21145",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json"
}
],
"title": "CVE-2024-21145"
},
{
"cve": "CVE-2024-21147",
"product_status": {
"known_affected": [
"CSAFPID-1503306",
"CSAFPID-1503302",
"CSAFPID-1503299",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21147",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json"
}
],
"title": "CVE-2024-21147"
},
{
"cve": "CVE-2024-21233",
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-21233"
},
{
"cve": "CVE-2024-21242",
"product_status": {
"known_affected": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673443",
"CSAFPID-1673444",
"CSAFPID-1673445"
]
}
],
"title": "CVE-2024-21242"
},
{
"cve": "CVE-2024-21251",
"product_status": {
"known_affected": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21251",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673450",
"CSAFPID-1673451",
"CSAFPID-1673452"
]
}
],
"title": "CVE-2024-21251"
},
{
"cve": "CVE-2024-21261",
"product_status": {
"known_affected": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673144",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-21261"
},
{
"cve": "CVE-2024-22018",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22018"
},
{
"cve": "CVE-2024-22020",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22020",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-22020"
},
{
"cve": "CVE-2024-22201",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-22201"
},
{
"cve": "CVE-2024-23807",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650831",
"CSAFPID-1650825",
"CSAFPID-1673479",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23807"
},
{
"cve": "CVE-2024-23944",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-23944",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-23944"
},
{
"cve": "CVE-2024-24989",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24989",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json"
}
],
"title": "CVE-2024-24989"
},
{
"cve": "CVE-2024-24990",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24990",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-24990"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-342816",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-912046",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816798",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1673384",
"CSAFPID-816871",
"CSAFPID-816798",
"CSAFPID-342816",
"CSAFPID-764275",
"CSAFPID-764752",
"CSAFPID-816801",
"CSAFPID-816846",
"CSAFPID-912044",
"CSAFPID-912045",
"CSAFPID-912046",
"CSAFPID-912561",
"CSAFPID-912567",
"CSAFPID-912600",
"CSAFPID-912601",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-816845",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27983",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-27983"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673442",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-89587",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-28887",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28887",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-28887"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673488",
"CSAFPID-1673489",
"CSAFPID-1673491",
"CSAFPID-1673492",
"CSAFPID-1673493",
"CSAFPID-1673495",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673497",
"CSAFPID-1673397",
"CSAFPID-1673384",
"CSAFPID-1503575",
"CSAFPID-1503603",
"CSAFPID-764250",
"CSAFPID-1503612",
"CSAFPID-1503640",
"CSAFPID-342816",
"CSAFPID-816845",
"CSAFPID-816846",
"CSAFPID-1503299",
"CSAFPID-1503302",
"CSAFPID-1503306",
"CSAFPID-1503661",
"CSAFPID-1503663",
"CSAFPID-764813"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-31079",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-31079",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-31079"
},
{
"cve": "CVE-2024-32760",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-32760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-32760"
},
{
"cve": "CVE-2024-34161",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34161",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-34161"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673504",
"CSAFPID-1673506"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35200",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-35200"
},
{
"cve": "CVE-2024-36137",
"cwe": {
"id": "CWE-275",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "other",
"text": "Incorrect Permission Assignment for Critical Resource",
"title": "CWE-732"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-36137"
},
{
"cve": "CVE-2024-36138",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36138",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json"
}
],
"title": "CVE-2024-36138"
},
{
"cve": "CVE-2024-36387",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36387",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-36387"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673507",
"CSAFPID-1673508",
"CSAFPID-1673509"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37372",
"product_status": {
"known_affected": [
"CSAFPID-89587"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37372",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-89587"
]
}
],
"title": "CVE-2024-37372"
},
{
"cve": "CVE-2024-38356",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38356",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38356"
},
{
"cve": "CVE-2024-38357",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38357",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673510",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38357"
},
{
"cve": "CVE-2024-38472",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38472",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38472"
},
{
"cve": "CVE-2024-38473",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38474",
"cwe": {
"id": "CWE-172",
"name": "Encoding Error"
},
"notes": [
{
"category": "other",
"text": "Encoding Error",
"title": "CWE-172"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38474"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38476",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38476"
},
{
"cve": "CVE-2024-38477",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38477",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-38477"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673511",
"CSAFPID-1673512",
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-39573",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-39884",
"cwe": {
"id": "CWE-18",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-18",
"title": "CWE-18"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-39884",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417"
]
}
],
"title": "CVE-2024-39884"
},
{
"cve": "CVE-2024-40725",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Exposure of Resource to Wrong Sphere",
"title": "CWE-668"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40725",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40725"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"product_status": {
"known_affected": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-345049",
"CSAFPID-611417",
"CSAFPID-1673479"
]
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673385",
"CSAFPID-1673442",
"CSAFPID-1673386"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-45801",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45801",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1503575",
"CSAFPID-1673188"
]
}
],
"title": "CVE-2024-45801"
}
]
}
ncsc-2024-0243
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Er zijn kwetsbaarheden verholpen in PHP.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om willekeurige code uit te voeren met rechten van de applicatie.\n\nDe kwetsbaarheid met kenmerk CVE-2024-4577 is feitelijk een herintreding van de kwetsbaarheid met kenmerk CVE-2012-1823. Deze kwetsbaarheid maakt het mogelijk om willekeurige code uit te voeren met rechten van de applicatie middels Command Injection.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "De ontwikkelaars van PHP hebben updates uitgebracht om de kwetsbaarheden te verhelpen in PHP 8.3.8, 8.2.20 en 8.1.29. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4577"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.1.29"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.2.20"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd",
"url": "https://www.php.net/ChangeLog-8.php#8.3.8"
}
],
"title": "Kwetsbaarheden verholpen in PHP",
"tracking": {
"current_release_date": "2024-06-10T07:02:05.106950Z",
"id": "NCSC-2024-0243",
"initial_release_date": "2024-06-10T07:02:05.106950Z",
"revision_history": [
{
"date": "2024-06-10T07:02:05.106950Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.1._:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.2._:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1464385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php_group:php:8.3._:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "php_group"
},
{
"branches": [
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-220483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-895265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473449",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-200792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.1.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-294412",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473450",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473451",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-895277",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.2.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-908830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473452",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "php",
"product": {
"name": "php",
"product_id": "CSAFPID-1473454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:php:php:8.3.7:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "php"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-1874"
},
{
"cve": "CVE-2024-4577",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-4577"
},
{
"cve": "CVE-2024-5458",
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-5458"
},
{
"cve": "CVE-2024-5585",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1464383",
"CSAFPID-1464384",
"CSAFPID-1464385"
]
}
],
"title": "CVE-2024-5585"
}
]
}
fkie_cve-2024-1874
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@php.net | http://www.openwall.com/lists/oss-security/2024/04/12/11 | Mailing List | |
| security@php.net | http://www.openwall.com/lists/oss-security/2024/06/07/1 | Mailing List | |
| security@php.net | https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 | Exploit, Vendor Advisory | |
| security@php.net | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ | Mailing List | |
| security@php.net | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ | Mailing List | |
| security@php.net | https://security.netapp.com/advisory/ntap-20240510-0009/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/04/12/11 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240510-0009/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585 | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| php | php | * | |
| php | php | * | |
| php | php | * | |
| fedoraproject | fedora | 39 | |
| fedoraproject | fedora | 40 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A888D1BE-9D93-4707-AA45-61EF1DB5488C",
"versionEndExcluding": "8.1.28",
"versionStartIncluding": "8.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC1B000-D5C4-49E9-8EFE-8C5C8FF50AF2",
"versionEndExcluding": "8.2.18",
"versionStartIncluding": "8.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE619987-797E-493B-B089-2E1CADDA9C47",
"versionEndExcluding": "8.3.5",
"versionStartIncluding": "8.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell."
},
{
"lang": "es",
"value": "En las versiones de PHP 8.1.* anteriores a 8.1.28, 8.2.* anteriores a 8.2.18, 8.3.* anteriores a 8.3.5, cuando se utiliza el comando proc_open() con sintaxis de matriz, debido a un escape insuficiente, si los argumentos del comando ejecutado son controlado por un usuario malintencionado, el usuario puede proporcionar argumentos que ejecutar\u00edan comandos arbitrarios en el shell de Windows."
}
],
"id": "CVE-2024-1874",
"lastModified": "2025-06-18T21:12:24.433",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"source": "security@php.net",
"type": "Secondary"
}
]
},
"published": "2024-04-29T04:15:07.580",
"references": [
{
"source": "security@php.net",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11"
},
{
"source": "security@php.net",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/07/1"
},
{
"source": "security@php.net",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
},
{
"source": "security@php.net",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"
},
{
"source": "security@php.net",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"
},
{
"source": "security@php.net",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240510-0009/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2024/06/07/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20240510-0009/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585"
}
],
"sourceIdentifier": "security@php.net",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-116"
}
],
"source": "security@php.net",
"type": "Secondary"
}
]
}
gsd-2024-1874
Vulnerability from gsd
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-1874"
],
"details": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n",
"id": "GSD-2024-1874",
"modified": "2024-02-25T06:02:56.350451Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@php.net",
"ID": "CVE-2024-1874",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PHP",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "8.1.28",
"status": "affected",
"version": "8.1.*",
"versionType": "semver"
},
{
"lessThan": "8.2.18",
"status": "affected",
"version": "8.2.*",
"versionType": "semver"
},
{
"lessThan": "8.3.5",
"status": "affected",
"version": "8.3.*",
"versionType": "semver"
}
]
}
}
]
}
}
]
},
"vendor_name": "PHP Group"
}
]
}
},
"configuration": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This problem only present in Windows versions of PHP.\u0026nbsp;"
}
],
"value": "This problem only present in Windows versions of PHP.\u00a0"
}
],
"credits": [
{
"lang": "en",
"value": "RyotaK"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-116",
"lang": "eng",
"value": "CWE-116 Improper Encoding or Escaping of Output"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7",
"refsource": "MISC",
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
}
]
},
"source": {
"advisory": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Using proc_open() string syntax avoids the problem.\u0026nbsp;"
}
],
"value": "Using proc_open() string syntax avoids the problem.\u00a0"
}
]
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n"
}
],
"id": "CVE-2024-1874",
"lastModified": "2024-04-29T04:15:07.580",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5,
"source": "security@php.net",
"type": "Secondary"
}
]
},
"published": "2024-04-29T04:15:07.580",
"references": [
{
"source": "security@php.net",
"url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"
}
],
"sourceIdentifier": "security@php.net",
"vulnStatus": "Received",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-116"
}
],
"source": "security@php.net",
"type": "Secondary"
}
]
}
}
}
}
CERTFR-2024-AVI-0300
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans PHP. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "PHP versions 8.3.x ant\u00e9rieures \u00e0 8.3.6",
"product": {
"name": "PHP",
"vendor": {
"name": "PHP",
"scada": false
}
}
},
{
"description": "PHP versions 8.2.x ant\u00e9rieures \u00e0 8.2.18",
"product": {
"name": "PHP",
"vendor": {
"name": "PHP",
"scada": false
}
}
},
{
"description": "PHP versions 8.1.x ant\u00e9rieures \u00e0 8.1.28",
"product": {
"name": "PHP",
"vendor": {
"name": "PHP",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-3096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3096"
},
{
"name": "CVE-2024-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2756"
},
{
"name": "CVE-2024-1874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1874"
},
{
"name": "CVE-2024-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2757"
}
],
"initial_release_date": "2024-04-12T00:00:00",
"last_revision_date": "2024-04-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0300",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans PHP. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et\nun d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans PHP",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 PHP 8.3.6 du 11 avril 2024",
"url": "https://www.php.net/ChangeLog-8.php#8.3.6"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 PHP 8.2.18 du 11 avril 2024",
"url": "https://www.php.net/ChangeLog-8.php#8.2.18"
}
]
}
CERTFR-2024-AVI-0475
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Security Center | Security Center versions antérieures à 6.4.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security Center versions ant\u00e9rieures \u00e0 6.4.0",
"product": {
"name": "Security Center",
"vendor": {
"name": "Tenable",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24795"
},
{
"name": "CVE-2023-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38709"
},
{
"name": "CVE-2024-27316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27316"
},
{
"name": "CVE-2024-3096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3096"
},
{
"name": "CVE-2024-1874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1874"
},
{
"name": "CVE-2024-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1891"
},
{
"name": "CVE-2024-5759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5759"
}
],
"initial_release_date": "2024-06-11T00:00:00",
"last_revision_date": "2024-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0475",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Security Center. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Security Center",
"vendor_advisories": [
{
"published_at": "2024-07-02",
"title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2024-10",
"url": "https://www.tenable.com/security/tns-2024-10"
}
]
}
msrc_cve-2024-1874
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874 Command injection via array-ish $command parameter of proc_open() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-1874.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Command injection via array-ish $command parameter of proc_open()",
"tracking": {
"current_release_date": "2024-06-30T07:00:00.000Z",
"generator": {
"date": "2025-10-20T01:14:16.716Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-1874",
"initial_release_date": "2024-04-02T07:00:00.000Z",
"revision_history": [
{
"date": "2024-04-29T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 php 8.3.8-1",
"product": {
"name": "\u003cazl3 php 8.3.8-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 php 8.3.8-1",
"product": {
"name": "azl3 php 8.3.8-1",
"product_id": "17719"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 php 8.3.6-1",
"product": {
"name": "\u003cazl3 php 8.3.6-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 php 8.3.6-1",
"product": {
"name": "azl3 php 8.3.6-1",
"product_id": "17752"
}
}
],
"category": "product_name",
"name": "php"
},
{
"category": "product_name",
"name": "cbl2 php 8.1.22-2",
"product": {
"name": "cbl2 php 8.1.22-2",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 php 8.3.8-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 php 8.3.8-1 as a component of Azure Linux 3.0",
"product_id": "17719-17084"
},
"product_reference": "17719",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 php 8.3.6-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 php 8.3.6-1 as a component of Azure Linux 3.0",
"product_id": "17752-17084"
},
"product_reference": "17752",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 php 8.1.22-2 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1874",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-1"
]
}
],
"notes": [
{
"category": "general",
"text": "php",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17719-17084",
"17752-17084"
],
"known_affected": [
"17084-3",
"17084-2"
],
"known_not_affected": [
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1874 Command injection via array-ish $command parameter of proc_open() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-1874.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-29T00:00:00.000Z",
"details": "8.3.8-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.4,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"17084-3",
"17084-2"
]
}
],
"title": "Command injection via array-ish $command parameter of proc_open()"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.