Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-27732 (GCVE-0-2025-27732)
Vulnerability from cvelistv5
Published
2025-04-08 17:24
      Modified
2025-06-04 17:53
      
          Severity ?
        
        
      
          VLAI Severity ?
        
        
          EPSS score ?
        
        CWE
          - CWE-591 - Sensitive Data Storage in Improperly Locked Memory
Summary
Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
            
          
        References
          | URL | Tags | ||
|---|---|---|---|
Impacted products
        | Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | Version: 10.0.17763.0   < 10.0.17763.7136 | ||
|  | ||||
{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-27732",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-08T18:35:01.559494Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-08T18:35:12.853Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "32-bit Systems",
            "x64-based Systems"
          ],
          "product": "Windows 10 Version 1809",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.17763.7136",
              "status": "affected",
              "version": "10.0.17763.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2019",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.17763.7136",
              "status": "affected",
              "version": "10.0.17763.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2019 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.17763.7136",
              "status": "affected",
              "version": "10.0.17763.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2022",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.20348.3453",
              "status": "affected",
              "version": "10.0.20348.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "32-bit Systems",
            "ARM64-based Systems",
            "x64-based Systems"
          ],
          "product": "Windows 10 Version 21H2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.19044.5737",
              "status": "affected",
              "version": "10.0.19044.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "ARM64-based Systems",
            "x64-based Systems"
          ],
          "product": "Windows 11 version 22H2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.22621.5189",
              "status": "affected",
              "version": "10.0.22621.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems",
            "ARM64-based Systems",
            "32-bit Systems"
          ],
          "product": "Windows 10 Version 22H2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.19045.5737",
              "status": "affected",
              "version": "10.0.19045.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2025 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.26100.3775",
              "status": "affected",
              "version": "10.0.26100.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "ARM64-based Systems"
          ],
          "product": "Windows 11 version 22H3",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.22631.5189",
              "status": "affected",
              "version": "10.0.22631.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows 11 Version 23H2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.22631.5189",
              "status": "affected",
              "version": "10.0.22631.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2022, 23H2 Edition (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.25398.1551",
              "status": "affected",
              "version": "10.0.25398.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "ARM64-based Systems",
            "x64-based Systems"
          ],
          "product": "Windows 11 Version 24H2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.26100.3775",
              "status": "affected",
              "version": "10.0.26100.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2025",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.26100.3775",
              "status": "affected",
              "version": "10.0.26100.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "32-bit Systems",
            "x64-based Systems"
          ],
          "product": "Windows 10 Version 1507",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.10240.20978",
              "status": "affected",
              "version": "10.0.10240.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "32-bit Systems",
            "x64-based Systems"
          ],
          "product": "Windows 10 Version 1607",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.14393.7969",
              "status": "affected",
              "version": "10.0.14393.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2016",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.14393.7969",
              "status": "affected",
              "version": "10.0.14393.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2016 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "10.0.14393.7969",
              "status": "affected",
              "version": "10.0.14393.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "32-bit Systems"
          ],
          "product": "Windows Server 2008 Service Pack 2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.6003.23220",
              "status": "affected",
              "version": "6.0.6003.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "32-bit Systems",
            "x64-based Systems"
          ],
          "product": "Windows Server 2008 Service Pack 2 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.6003.23220",
              "status": "affected",
              "version": "6.0.6003.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2008  Service Pack 2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.0.6003.23220",
              "status": "affected",
              "version": "6.0.6003.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2008 R2 Service Pack 1",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.1.7601.27670",
              "status": "affected",
              "version": "6.1.7601.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.1.7601.27670",
              "status": "affected",
              "version": "6.1.7601.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2012",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.2.9200.25423",
              "status": "affected",
              "version": "6.2.9200.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2012 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.2.9200.25423",
              "status": "affected",
              "version": "6.2.9200.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2012 R2",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.3.9600.22523",
              "status": "affected",
              "version": "6.3.9600.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "platforms": [
            "x64-based Systems"
          ],
          "product": "Windows Server 2012 R2 (Server Core installation)",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThan": "6.3.9600.22523",
              "status": "affected",
              "version": "6.3.9600.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
                  "versionEndExcluding": "10.0.17763.7136",
                  "versionStartIncluding": "10.0.17763.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.17763.7136",
                  "versionStartIncluding": "10.0.17763.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.17763.7136",
                  "versionStartIncluding": "10.0.17763.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.20348.3453",
                  "versionStartIncluding": "10.0.20348.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*",
                  "versionEndExcluding": "10.0.19044.5737",
                  "versionStartIncluding": "10.0.19044.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*",
                  "versionEndExcluding": "10.0.22621.5189",
                  "versionStartIncluding": "10.0.22621.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "10.0.19045.5737",
                  "versionStartIncluding": "10.0.19045.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.26100.3775",
                  "versionStartIncluding": "10.0.26100.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*",
                  "versionEndExcluding": "10.0.22631.5189",
                  "versionStartIncluding": "10.0.22631.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "10.0.22631.5189",
                  "versionStartIncluding": "10.0.22631.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.25398.1551",
                  "versionStartIncluding": "10.0.25398.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*",
                  "versionEndExcluding": "10.0.26100.3775",
                  "versionStartIncluding": "10.0.26100.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.26100.3775",
                  "versionStartIncluding": "10.0.26100.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
                  "versionEndExcluding": "10.0.10240.20978",
                  "versionStartIncluding": "10.0.10240.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
                  "versionEndExcluding": "10.0.14393.7969",
                  "versionStartIncluding": "10.0.14393.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.14393.7969",
                  "versionStartIncluding": "10.0.14393.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "10.0.14393.7969",
                  "versionStartIncluding": "10.0.14393.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.0.6003.23220",
                  "versionStartIncluding": "6.0.6003.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.0.6003.23220",
                  "versionStartIncluding": "6.0.6003.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
                  "versionEndExcluding": "6.0.6003.23220",
                  "versionStartIncluding": "6.0.6003.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.1.7601.27670",
                  "versionStartIncluding": "6.1.7601.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.1.7601.27670",
                  "versionStartIncluding": "6.1.7601.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.2.9200.25423",
                  "versionStartIncluding": "6.2.9200.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.2.9200.25423",
                  "versionStartIncluding": "6.2.9200.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.3.9600.22523",
                  "versionStartIncluding": "6.3.9600.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
                  "versionEndExcluding": "6.3.9600.22523",
                  "versionStartIncluding": "6.3.9600.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "datePublic": "2025-04-08T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en-US",
          "value": "Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en-US",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-591",
              "description": "CWE-591: Sensitive Data Storage in Improperly Locked Memory",
              "lang": "en-US",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-04T17:53:22.037Z",
        "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
        "shortName": "microsoft"
      },
      "references": [
        {
          "name": "Windows Graphics Component Elevation of Privilege Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
        }
      ],
      "title": "Windows Graphics Component Elevation of Privilege Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
    "assignerShortName": "microsoft",
    "cveId": "CVE-2025-27732",
    "datePublished": "2025-04-08T17:24:08.140Z",
    "dateReserved": "2025-03-06T04:26:08.552Z",
    "dateUpdated": "2025-06-04T17:53:22.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-27732\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-04-08T18:16:01.333\",\"lastModified\":\"2025-07-08T17:10:00.610\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.\"},{\"lang\":\"es\",\"value\":\"Almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Windows Win32K: GRFX permite que un atacante autorizado eleve privilegios localmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-591\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.10240.20978\",\"matchCriteriaId\":\"575117BF-9A1E-4B90-85D8-4172A58B3B72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.10240.20978\",\"matchCriteriaId\":\"B3B4804C-685B-4F37-92DE-CE73D1B106B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.14393.7969\",\"matchCriteriaId\":\"474622F8-06D4-4AD1-8D72-A674909A7634\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.14393.7969\",\"matchCriteriaId\":\"559D55D4-2BF2-4B8F-90CA-C6B885334A3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"13A4A79D-8D45-48FA-84F5-CE1A78E8E424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"03AB53EC-354E-4F30-A278-2835CA341503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19044.5737\",\"matchCriteriaId\":\"2ACCA6F4-C140-4B2E-93FF-1B9DC093E831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.19045.5737\",\"matchCriteriaId\":\"09E0970D-79B9-40D9-BFFF-25EE5A686B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22621.5189\",\"matchCriteriaId\":\"640C45C8-83C3-4BBC-9176-705BEAA80E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.22631.5189\",\"matchCriteriaId\":\"4CE9402D-6417-4F82-909A-D89C06C98794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.26100.3775\",\"matchCriteriaId\":\"ED4B5FB3-A574-4DA6-9A43-0950B121CC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*\",\"matchCriteriaId\":\"2127D10C-B6F3-4C1D-B9AA-5D78513CC996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*\",\"matchCriteriaId\":\"AB425562-C0A0-452E-AABE-F70522F15E1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"matchCriteriaId\":\"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.7969\",\"matchCriteriaId\":\"6A232AB6-1EC5-44E7-AB75-0EB9A5A63259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.7136\",\"matchCriteriaId\":\"D2941A94-927C-4393-B2A0-4630F03B8B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.3453\",\"matchCriteriaId\":\"52706BEC-E3D6-4188-BB88-7078FE4AF970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.25398.1551\",\"matchCriteriaId\":\"0DA8E1E4-0C78-4ADC-9490-4A608D8601FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.26100.3775\",\"matchCriteriaId\":\"99601356-2DEE-482F-BCBC-A5C7D92D2D74\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-27732\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-08T18:35:01.559494Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-08T18:35:06.700Z\"}}], \"cna\": {\"title\": \"Windows Graphics Component Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1809\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7136\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.20348.0\", \"lessThan\": \"10.0.20348.3453\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 21H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.19044.0\", \"lessThan\": \"10.0.19044.5737\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"ARM64-based Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22621.0\", \"lessThan\": \"10.0.22621.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.19045.0\", \"lessThan\": \"10.0.19045.5737\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-based Systems\", \"32-bit Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2025 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.26100.0\", \"lessThan\": \"10.0.26100.3775\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H3\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22631.0\", \"lessThan\": \"10.0.22631.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 Version 23H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.22631.0\", \"lessThan\": \"10.0.22631.5189\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022, 23H2 Edition (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.25398.0\", \"lessThan\": \"10.0.25398.1551\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 11 Version 24H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.26100.0\", \"lessThan\": \"10.0.26100.3775\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2025\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.26100.0\", \"lessThan\": \"10.0.26100.3775\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1507\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.10240.0\", \"lessThan\": \"10.0.10240.20978\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1607\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.14393.0\", \"lessThan\": \"10.0.14393.7969\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.14393.0\", \"lessThan\": \"10.0.14393.7969\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.14393.0\", \"lessThan\": \"10.0.14393.7969\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.6003.0\", \"lessThan\": \"6.0.6003.23220\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.6003.0\", \"lessThan\": \"6.0.6003.23220\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008  Service Pack 2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.6003.0\", \"lessThan\": \"6.0.6003.23220\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack 1\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1.7601.0\", \"lessThan\": \"6.1.7601.27670\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack 1 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1.7601.0\", \"lessThan\": \"6.1.7601.27670\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.9200.0\", \"lessThan\": \"6.2.9200.25423\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.9200.0\", \"lessThan\": \"6.2.9200.25423\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.9600.0\", \"lessThan\": \"6.3.9600.22523\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.9600.0\", \"lessThan\": \"6.3.9600.22523\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}], \"datePublic\": \"2025-04-08T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732\", \"name\": \"Windows Graphics Component Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-591\", \"description\": \"CWE-591: Sensitive Data Storage in Improperly Locked Memory\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7136\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.20348.3453\", \"versionStartIncluding\": \"10.0.20348.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.19044.5737\", \"versionStartIncluding\": \"10.0.19044.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22621.5189\", \"versionStartIncluding\": \"10.0.22621.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.19045.5737\", \"versionStartIncluding\": \"10.0.19045.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.26100.3775\", \"versionStartIncluding\": \"10.0.26100.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22631.5189\", \"versionStartIncluding\": \"10.0.22631.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.22631.5189\", \"versionStartIncluding\": \"10.0.22631.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.25398.1551\", \"versionStartIncluding\": \"10.0.25398.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.26100.3775\", \"versionStartIncluding\": \"10.0.26100.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.26100.3775\", \"versionStartIncluding\": \"10.0.26100.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.10240.20978\", \"versionStartIncluding\": \"10.0.10240.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.14393.7969\", \"versionStartIncluding\": \"10.0.14393.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.14393.7969\", \"versionStartIncluding\": \"10.0.14393.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.14393.7969\", \"versionStartIncluding\": \"10.0.14393.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.6003.23220\", \"versionStartIncluding\": \"6.0.6003.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.6003.23220\", \"versionStartIncluding\": \"6.0.6003.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.6003.23220\", \"versionStartIncluding\": \"6.0.6003.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.7601.27670\", \"versionStartIncluding\": \"6.1.7601.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.7601.27670\", \"versionStartIncluding\": \"6.1.7601.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.9200.25423\", \"versionStartIncluding\": \"6.2.9200.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.9200.25423\", \"versionStartIncluding\": \"6.2.9200.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.9600.22523\", \"versionStartIncluding\": \"6.3.9600.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.9600.22523\", \"versionStartIncluding\": \"6.3.9600.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-06-04T17:53:22.037Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-27732\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-04T17:53:22.037Z\", \"dateReserved\": \"2025-03-06T04:26:08.552Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-04-08T17:24:08.140Z\", \"assignerShortName\": \"microsoft\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  fkie_cve-2025-27732
Vulnerability from fkie_nvd
Published
2025-04-08 18:16
    Modified
2025-07-08 17:10
    
          Severity ?
        
        
    Summary
Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
    References
      | URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732 | Vendor Advisory | 
Impacted products
      {
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
              "matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72",
              "versionEndExcluding": "10.0.10240.20978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
              "matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4",
              "versionEndExcluding": "10.0.10240.20978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
              "matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634",
              "versionEndExcluding": "10.0.14393.7969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
              "matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E",
              "versionEndExcluding": "10.0.14393.7969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
              "matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424",
              "versionEndExcluding": "10.0.17763.7136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
              "matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503",
              "versionEndExcluding": "10.0.17763.7136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831",
              "versionEndExcluding": "10.0.19044.5737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04",
              "versionEndExcluding": "10.0.19045.5737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64",
              "versionEndExcluding": "10.0.22621.5189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794",
              "versionEndExcluding": "10.0.22631.5189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92",
              "versionEndExcluding": "10.0.26100.3775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
              "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
              "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259",
              "versionEndExcluding": "10.0.14393.7969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A",
              "versionEndExcluding": "10.0.17763.7136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970",
              "versionEndExcluding": "10.0.20348.3453",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD",
              "versionEndExcluding": "10.0.25398.1551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74",
              "versionEndExcluding": "10.0.26100.3775",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."
    },
    {
      "lang": "es",
      "value": "Almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Windows Win32K: GRFX permite que un atacante autorizado eleve privilegios localmente."
    }
  ],
  "id": "CVE-2025-27732",
  "lastModified": "2025-07-08T17:10:00.610",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-04-08T18:16:01.333",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-591"
        }
      ],
      "source": "secure@microsoft.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-667"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-7qv7-c4h7-rw9m
Vulnerability from github
Published
2025-04-08 18:34
    Modified
2025-04-08 18:34
    
        Severity ?
      
      
    
        VLAI Severity ?
      
      Details
Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
{
  "affected": [],
  "aliases": [
    "CVE-2025-27732"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-591",
      "CWE-667"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-04-08T18:16:01Z",
    "severity": "HIGH"
  },
  "details": "Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.",
  "id": "GHSA-7qv7-c4h7-rw9m",
  "modified": "2025-04-08T18:34:52Z",
  "published": "2025-04-08T18:34:52Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27732"
    },
    {
      "type": "WEB",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  CERTFR-2025-AVI-0288
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2025-29824 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
        | Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22523 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.379.0 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5191 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6081.0 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Admin Center versions antérieures à 2.4.2.1 | ||
| Microsoft | Windows | Windows Admin Center in Azure Portal versions antérieures à 0.45.0.0 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5191 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25423 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.3454 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3454 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27670 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27670 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22523 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25423 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1551 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191 | 
References
        {
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22523",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.379.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6081.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Admin Center versions ant\u00e9rieures \u00e0 2.4.2.1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Admin Center in Azure Portal versions ant\u00e9rieures \u00e0 0.45.0.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25423",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3454",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3454",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27670",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27670",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22523",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25423",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1551",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-26641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26641"
    },
    {
      "name": "CVE-2025-21221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21221"
    },
    {
      "name": "CVE-2025-26670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26670"
    },
    {
      "name": "CVE-2025-26669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26669"
    },
    {
      "name": "CVE-2025-26666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26666"
    },
    {
      "name": "CVE-2025-26647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26647"
    },
    {
      "name": "CVE-2025-26680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26680"
    },
    {
      "name": "CVE-2025-26668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26668"
    },
    {
      "name": "CVE-2025-26672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26672"
    },
    {
      "name": "CVE-2025-21191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21191"
    },
    {
      "name": "CVE-2025-27482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27482"
    },
    {
      "name": "CVE-2025-27469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27469"
    },
    {
      "name": "CVE-2025-26676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26676"
    },
    {
      "name": "CVE-2025-27737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27737"
    },
    {
      "name": "CVE-2025-26688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26688"
    },
    {
      "name": "CVE-2025-21174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21174"
    },
    {
      "name": "CVE-2025-27474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27474"
    },
    {
      "name": "CVE-2025-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26686"
    },
    {
      "name": "CVE-2025-26667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26667"
    },
    {
      "name": "CVE-2025-26674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26674"
    },
    {
      "name": "CVE-2025-24058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24058"
    },
    {
      "name": "CVE-2025-26648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26648"
    },
    {
      "name": "CVE-2025-27735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27735"
    },
    {
      "name": "CVE-2025-26673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26673"
    },
    {
      "name": "CVE-2025-27471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27471"
    },
    {
      "name": "CVE-2025-27492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27492"
    },
    {
      "name": "CVE-2025-27470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27470"
    },
    {
      "name": "CVE-2025-27472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27472"
    },
    {
      "name": "CVE-2025-26639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26639"
    },
    {
      "name": "CVE-2025-26637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26637"
    },
    {
      "name": "CVE-2025-21203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21203"
    },
    {
      "name": "CVE-2025-26644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26644"
    },
    {
      "name": "CVE-2025-29810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29810"
    },
    {
      "name": "CVE-2025-27485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27485"
    },
    {
      "name": "CVE-2025-29808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29808"
    },
    {
      "name": "CVE-2025-27732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27732"
    },
    {
      "name": "CVE-2025-27479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27479"
    },
    {
      "name": "CVE-2025-21205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21205"
    },
    {
      "name": "CVE-2025-27739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27739"
    },
    {
      "name": "CVE-2025-27491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27491"
    },
    {
      "name": "CVE-2025-27480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27480"
    },
    {
      "name": "CVE-2025-27484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27484"
    },
    {
      "name": "CVE-2025-26665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26665"
    },
    {
      "name": "CVE-2025-27475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27475"
    },
    {
      "name": "CVE-2025-24060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24060"
    },
    {
      "name": "CVE-2025-27483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27483"
    },
    {
      "name": "CVE-2025-27738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27738"
    },
    {
      "name": "CVE-2025-27731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27731"
    },
    {
      "name": "CVE-2025-27476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27476"
    },
    {
      "name": "CVE-2025-29812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29812"
    },
    {
      "name": "CVE-2025-27728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27728"
    },
    {
      "name": "CVE-2025-27733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27733"
    },
    {
      "name": "CVE-2025-27729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27729"
    },
    {
      "name": "CVE-2025-21204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21204"
    },
    {
      "name": "CVE-2025-24062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24062"
    },
    {
      "name": "CVE-2025-27740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27740"
    },
    {
      "name": "CVE-2025-24073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24073"
    },
    {
      "name": "CVE-2025-26649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26649"
    },
    {
      "name": "CVE-2025-27741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27741"
    },
    {
      "name": "CVE-2025-27481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27481"
    },
    {
      "name": "CVE-2025-26651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26651"
    },
    {
      "name": "CVE-2025-27486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27486"
    },
    {
      "name": "CVE-2025-24074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24074"
    },
    {
      "name": "CVE-2025-21222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21222"
    },
    {
      "name": "CVE-2025-26671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26671"
    },
    {
      "name": "CVE-2025-29819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29819"
    },
    {
      "name": "CVE-2025-26663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26663"
    },
    {
      "name": "CVE-2025-27473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27473"
    },
    {
      "name": "CVE-2025-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29824"
    },
    {
      "name": "CVE-2025-26652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26652"
    },
    {
      "name": "CVE-2025-27736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27736"
    },
    {
      "name": "CVE-2025-27467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27467"
    },
    {
      "name": "CVE-2025-27487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27487"
    },
    {
      "name": "CVE-2025-26664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26664"
    },
    {
      "name": "CVE-2025-26678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26678"
    },
    {
      "name": "CVE-2025-26635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26635"
    },
    {
      "name": "CVE-2025-26681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26681"
    },
    {
      "name": "CVE-2025-27477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27477"
    },
    {
      "name": "CVE-2025-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26675"
    },
    {
      "name": "CVE-2025-27490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27490"
    },
    {
      "name": "CVE-2025-26687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26687"
    },
    {
      "name": "CVE-2025-27730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27730"
    },
    {
      "name": "CVE-2025-27742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27742"
    },
    {
      "name": "CVE-2025-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21197"
    },
    {
      "name": "CVE-2025-27727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27727"
    },
    {
      "name": "CVE-2025-26679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26679"
    },
    {
      "name": "CVE-2025-26640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26640"
    },
    {
      "name": "CVE-2025-29809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29809"
    },
    {
      "name": "CVE-2025-27478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27478"
    },
    {
      "name": "CVE-2025-29811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29811"
    }
  ],
  "initial_release_date": "2025-04-09T00:00:00",
  "last_revision_date": "2025-04-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0288",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-29824 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26637",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27492",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27478",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27480",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27483",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21203",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26647",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27467",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27469",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27479",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27479"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21191",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26668",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26672",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27486",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26665",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27736",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27736"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21197",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27485",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24073",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26678",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26669",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24074",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26687",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27474",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27731",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27727",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27491",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27481",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21204",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26680",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26681",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26681"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27484",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27476",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27476"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27737",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27729",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27733",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26671",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26676",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26686",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24060",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26663",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29810",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26667",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27739",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27739"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26688",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26688"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29811",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29811"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26651",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26651"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27471",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21221",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26664",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27741",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26649",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26679",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27728",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24062",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24058",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24058"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21174",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26640",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26640"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27472",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27472"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29809",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21222",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29819",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29819"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27473",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26641",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26648",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27738",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26652",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26652"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27490",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26674",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26644",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26644"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27470",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27470"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29824",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26666",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26635",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27742",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26673",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26670",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27477",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27475",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27475"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27732",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27740",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29812",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29812"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21205",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29808",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27482",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27487",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27735",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26675",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26639",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27730",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730"
    }
  ]
}
  msrc_cve-2025-27732
Vulnerability from csaf_microsoft
Published
2025-04-08 07:00
    Modified
2025-04-10 07:00
    Summary
Windows Graphics Component Elevation of Privilege Vulnerability
    Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
    Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
    Customer Action
Required. The vulnerability documented by this CVE requires customer action to resolve.
    {
  "document": {
    "acknowledgments": [
      {
        "names": [
          "Anonymous"
        ]
      }
    ],
    "aggregate_severity": {
      "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      },
      {
        "category": "general",
        "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
        "title": "Customer Action"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability - HTML",
        "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
      },
      {
        "category": "self",
        "summary": "CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability - CSAF",
        "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-27732.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Exploitability Index",
        "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Windows Graphics Component Elevation of Privilege Vulnerability",
    "tracking": {
      "current_release_date": "2025-04-10T07:00:00.000Z",
      "generator": {
        "date": "2025-07-22T19:57:31.494Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2025-27732",
      "initial_release_date": "2025-04-08T07:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-04-08T07:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2025-04-10T07:00:00.000Z",
          "legacy_version": "2",
          "number": "2",
          "summary": "The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information."
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.7136",
            "product": {
              "name": "Windows 10 Version 1809 for 32-bit Systems \u003c10.0.17763.7136",
              "product_id": "21"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.7136",
            "product": {
              "name": "Windows 10 Version 1809 for 32-bit Systems 10.0.17763.7136",
              "product_id": "11568"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1809 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.7136",
            "product": {
              "name": "Windows 10 Version 1809 for x64-based Systems \u003c10.0.17763.7136",
              "product_id": "20"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.7136",
            "product": {
              "name": "Windows 10 Version 1809 for x64-based Systems 10.0.17763.7136",
              "product_id": "11569"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1809 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.7136",
            "product": {
              "name": "Windows Server 2019 \u003c10.0.17763.7136",
              "product_id": "19"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.7136",
            "product": {
              "name": "Windows Server 2019 10.0.17763.7136",
              "product_id": "11571"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2019"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.7136",
            "product": {
              "name": "Windows Server 2019 (Server Core installation) \u003c10.0.17763.7136",
              "product_id": "18"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.7136",
            "product": {
              "name": "Windows Server 2019 (Server Core installation) 10.0.17763.7136",
              "product_id": "11572"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2019 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.20348.3453",
            "product": {
              "name": "Windows Server 2022 \u003c10.0.20348.3453",
              "product_id": "17"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.20348.3453",
            "product": {
              "name": "Windows Server 2022 10.0.20348.3453",
              "product_id": "11923"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.20348.3453",
            "product": {
              "name": "Windows Server 2022 (Server Core installation) \u003c10.0.20348.3453",
              "product_id": "16"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.20348.3453",
            "product": {
              "name": "Windows Server 2022 (Server Core installation) 10.0.20348.3453",
              "product_id": "11924"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for 32-bit Systems \u003c10.0.19044.5737",
              "product_id": "15"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for 32-bit Systems 10.0.19044.5737",
              "product_id": "11929"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for ARM64-based Systems \u003c10.0.19044.5737",
              "product_id": "14"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.5737",
              "product_id": "11930"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for x64-based Systems \u003c10.0.19044.5737",
              "product_id": "13"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.5737",
            "product": {
              "name": "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.5737",
              "product_id": "11931"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22621.5189",
            "product": {
              "name": "Windows 11 Version 22H2 for ARM64-based Systems \u003c10.0.22621.5189",
              "product_id": "12"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22621.5189",
            "product": {
              "name": "Windows 11 Version 22H2 for ARM64-based Systems 10.0.22621.5189",
              "product_id": "12085"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 22H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22621.5189",
            "product": {
              "name": "Windows 11 Version 22H2 for x64-based Systems \u003c10.0.22621.5189",
              "product_id": "11"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22621.5189",
            "product": {
              "name": "Windows 11 Version 22H2 for x64-based Systems 10.0.22621.5189",
              "product_id": "12086"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 22H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for x64-based Systems \u003c10.0.19045.5737",
              "product_id": "10"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for x64-based Systems 10.0.19045.5737",
              "product_id": "12097"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for ARM64-based Systems \u003c10.0.19045.5737",
              "product_id": "9"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for ARM64-based Systems 10.0.19045.5737",
              "product_id": "12098"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for 32-bit Systems \u003c10.0.19045.5737",
              "product_id": "8"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.5737",
            "product": {
              "name": "Windows 10 Version 22H2 for 32-bit Systems 10.0.19045.5737",
              "product_id": "12099"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.26100.3775",
            "product": {
              "name": "Windows Server 2025 (Server Core installation) \u003c10.0.26100.3775",
              "product_id": "1"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.26100.3775",
            "product": {
              "name": "Windows Server 2025 (Server Core installation) 10.0.26100.3775",
              "product_id": "12437"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2025 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22631.5189",
            "product": {
              "name": "Windows 11 Version 23H2 for ARM64-based Systems \u003c10.0.22631.5189",
              "product_id": "7"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22631.5189",
            "product": {
              "name": "Windows 11 Version 23H2 for ARM64-based Systems 10.0.22631.5189",
              "product_id": "12242"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 23H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22631.5189",
            "product": {
              "name": "Windows 11 Version 23H2 for x64-based Systems \u003c10.0.22631.5189",
              "product_id": "6"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22631.5189",
            "product": {
              "name": "Windows 11 Version 23H2 for x64-based Systems 10.0.22631.5189",
              "product_id": "12243"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 23H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.25398.1551",
            "product": {
              "name": "Windows Server 2022, 23H2 Edition (Server Core installation) \u003c10.0.25398.1551",
              "product_id": "5"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.25398.1551",
            "product": {
              "name": "Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.1551",
              "product_id": "12244"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.26100.3775",
            "product": {
              "name": "Windows 11 Version 24H2 for ARM64-based Systems \u003c10.0.26100.3775",
              "product_id": "4"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.26100.3775",
            "product": {
              "name": "Windows 11 Version 24H2 for ARM64-based Systems 10.0.26100.3775",
              "product_id": "12389"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 24H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.26100.3775",
            "product": {
              "name": "Windows 11 Version 24H2 for x64-based Systems \u003c10.0.26100.3775",
              "product_id": "3"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.26100.3775",
            "product": {
              "name": "Windows 11 Version 24H2 for x64-based Systems 10.0.26100.3775",
              "product_id": "12390"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 24H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.26100.3775",
            "product": {
              "name": "Windows Server 2025 \u003c10.0.26100.3775",
              "product_id": "2"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.26100.3775",
            "product": {
              "name": "Windows Server 2025 10.0.26100.3775",
              "product_id": "12436"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2025"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.10240.20978",
            "product": {
              "name": "Windows 10 for 32-bit Systems \u003c10.0.10240.20978",
              "product_id": "27"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.10240.20978",
            "product": {
              "name": "Windows 10 for 32-bit Systems 10.0.10240.20978",
              "product_id": "10729"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.10240.20978",
            "product": {
              "name": "Windows 10 for x64-based Systems \u003c10.0.10240.20978",
              "product_id": "26"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.10240.20978",
            "product": {
              "name": "Windows 10 for x64-based Systems 10.0.10240.20978",
              "product_id": "10735"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.7969",
            "product": {
              "name": "Windows 10 Version 1607 for 32-bit Systems \u003c10.0.14393.7969",
              "product_id": "24"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.7969",
            "product": {
              "name": "Windows 10 Version 1607 for 32-bit Systems 10.0.14393.7969",
              "product_id": "10852"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1607 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.7969",
            "product": {
              "name": "Windows 10 Version 1607 for x64-based Systems \u003c10.0.14393.7969",
              "product_id": "23"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.7969",
            "product": {
              "name": "Windows 10 Version 1607 for x64-based Systems 10.0.14393.7969",
              "product_id": "10853"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1607 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.7969",
            "product": {
              "name": "Windows Server 2016 \u003c10.0.14393.7969",
              "product_id": "25"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.7969",
            "product": {
              "name": "Windows Server 2016 10.0.14393.7969",
              "product_id": "10816"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2016"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.7969",
            "product": {
              "name": "Windows Server 2016 (Server Core installation) \u003c10.0.14393.7969",
              "product_id": "22"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.7969",
            "product": {
              "name": "Windows Server 2016 (Server Core installation) 10.0.14393.7969",
              "product_id": "10855"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2016 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 \u003c6.0.6003.23220",
              "product_id": "37"
            }
          },
          {
            "category": "product_version",
            "name": "6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 6.0.6003.23220",
              "product_id": "9312"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 for 32-bit Systems Service Pack 2"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \u003c6.0.6003.23220",
              "product_id": "32"
            }
          },
          {
            "category": "product_version",
            "name": "6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 6.0.6003.23220",
              "product_id": "10287"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for x64-based Systems Service Pack 2 \u003c6.0.6003.23220",
              "product_id": "36"
            }
          },
          {
            "category": "product_version",
            "name": "6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for x64-based Systems Service Pack 2 6.0.6003.23220",
              "product_id": "9318"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 for x64-based Systems Service Pack 2"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \u003c6.0.6003.23220",
              "product_id": "35"
            }
          },
          {
            "category": "product_version",
            "name": "6.0.6003.23220",
            "product": {
              "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 6.0.6003.23220",
              "product_id": "9344"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.1.7601.27670",
            "product": {
              "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 \u003c6.1.7601.27670",
              "product_id": "33"
            }
          },
          {
            "category": "product_version",
            "name": "6.1.7601.27670",
            "product": {
              "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 6.1.7601.27670",
              "product_id": "10051"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.1.7601.27670",
            "product": {
              "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \u003c6.1.7601.27670",
              "product_id": "34"
            }
          },
          {
            "category": "product_version",
            "name": "6.1.7601.27670",
            "product": {
              "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 6.1.7601.27670",
              "product_id": "10049"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.2.9200.25423",
            "product": {
              "name": "Windows Server 2012 \u003c6.2.9200.25423",
              "product_id": "31"
            }
          },
          {
            "category": "product_version",
            "name": "6.2.9200.25423",
            "product": {
              "name": "Windows Server 2012 6.2.9200.25423",
              "product_id": "10378"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2012"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.2.9200.25423",
            "product": {
              "name": "Windows Server 2012 (Server Core installation) \u003c6.2.9200.25423",
              "product_id": "30"
            }
          },
          {
            "category": "product_version",
            "name": "6.2.9200.25423",
            "product": {
              "name": "Windows Server 2012 (Server Core installation) 6.2.9200.25423",
              "product_id": "10379"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2012 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.3.9600.22523",
            "product": {
              "name": "Windows Server 2012 R2 \u003c6.3.9600.22523",
              "product_id": "29"
            }
          },
          {
            "category": "product_version",
            "name": "6.3.9600.22523",
            "product": {
              "name": "Windows Server 2012 R2 6.3.9600.22523",
              "product_id": "10483"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2012 R2"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c6.3.9600.22523",
            "product": {
              "name": "Windows Server 2012 R2 (Server Core installation) \u003c6.3.9600.22523",
              "product_id": "28"
            }
          },
          {
            "category": "product_version",
            "name": "6.3.9600.22523",
            "product": {
              "name": "Windows Server 2012 R2 (Server Core installation) 6.3.9600.22523",
              "product_id": "10543"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2012 R2 (Server Core installation)"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-27732",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "general",
          "text": "Microsoft",
          "title": "Assigning CNA"
        },
        {
          "category": "faq",
          "text": "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.",
          "title": "What privileges could be gained by an attacker who successfully exploited this vulnerability?"
        },
        {
          "category": "faq",
          "text": "Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems  are available. Customers running Windows 10 should ensure the update is installed to be protected from this vulnerability.",
          "title": "Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?"
        },
        {
          "category": "faq",
          "text": "Successful exploitation of this vulnerability requires an attacker to win a race condition.",
          "title": "According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?"
        }
      ],
      "product_status": {
        "fixed": [
          "9312",
          "9318",
          "9344",
          "10049",
          "10051",
          "10287",
          "10378",
          "10379",
          "10483",
          "10543",
          "10729",
          "10735",
          "10816",
          "10852",
          "10853",
          "10855",
          "11568",
          "11569",
          "11571",
          "11572",
          "11923",
          "11924",
          "11929",
          "11930",
          "11931",
          "12085",
          "12086",
          "12097",
          "12098",
          "12099",
          "12242",
          "12243",
          "12244",
          "12389",
          "12390",
          "12436",
          "12437"
        ],
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6",
          "7",
          "8",
          "9",
          "10",
          "11",
          "12",
          "13",
          "14",
          "15",
          "16",
          "17",
          "18",
          "19",
          "20",
          "21",
          "22",
          "23",
          "24",
          "25",
          "26",
          "27",
          "28",
          "29",
          "30",
          "31",
          "32",
          "33",
          "34",
          "35",
          "36",
          "37"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability - HTML",
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
        },
        {
          "category": "self",
          "summary": "CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability - CSAF",
          "url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-27732.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.17763.7136:Security Update:https://support.microsoft.com/help/5055519",
          "product_ids": [
            "21",
            "20",
            "19",
            "18"
          ],
          "url": "https://support.microsoft.com/help/5055519"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.20348.3453:Security Update:https://support.microsoft.com/help/5055526",
          "product_ids": [
            "17",
            "16"
          ],
          "url": "https://support.microsoft.com/help/5055526"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.19044.5737:Security Update:https://support.microsoft.com/help/5055518",
          "product_ids": [
            "15",
            "14",
            "13"
          ],
          "url": "https://support.microsoft.com/help/5055518"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.22621.5189:Security Update:https://support.microsoft.com/help/5055528",
          "product_ids": [
            "12",
            "11"
          ],
          "url": "https://support.microsoft.com/help/5055528"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.19045.5737:Security Update:https://support.microsoft.com/help/5055518",
          "product_ids": [
            "10",
            "9",
            "8"
          ],
          "url": "https://support.microsoft.com/help/5055518"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.26100.3775:Security Update:https://support.microsoft.com/help/5055523",
          "product_ids": [
            "1",
            "4",
            "3",
            "2"
          ],
          "url": "https://support.microsoft.com/help/5055523"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.22631.5189:Security Update:https://support.microsoft.com/help/5055528",
          "product_ids": [
            "7",
            "6"
          ],
          "url": "https://support.microsoft.com/help/5055528"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.25398.1551:Security Update:https://support.microsoft.com/help/5055527",
          "product_ids": [
            "5"
          ],
          "url": "https://support.microsoft.com/help/5055527"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.10240.20978:Security Update:https://support.microsoft.com/help/5055547",
          "product_ids": [
            "27",
            "26"
          ],
          "url": "https://support.microsoft.com/help/5055547"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "10.0.14393.7969:Security Update:https://support.microsoft.com/help/5055521",
          "product_ids": [
            "24",
            "23",
            "25",
            "22"
          ],
          "url": "https://support.microsoft.com/help/5055521"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.0.6003.23220:Monthly Rollup:https://support.microsoft.com/help/5055609",
          "product_ids": [
            "37",
            "32",
            "36",
            "35"
          ],
          "url": "https://support.microsoft.com/help/5055609"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.0.6003.23220:Security Only:https://support.microsoft.com/help/5055596",
          "product_ids": [
            "37",
            "32",
            "36",
            "35"
          ],
          "url": "https://support.microsoft.com/help/5055596"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.1.7601.27670:Monthly Rollup:https://support.microsoft.com/help/5055561",
          "product_ids": [
            "33",
            "34"
          ],
          "url": "https://support.microsoft.com/help/5055561"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.1.7601.27670:Security Only:https://support.microsoft.com/help/5055570",
          "product_ids": [
            "33",
            "34"
          ],
          "url": "https://support.microsoft.com/help/5055570"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.2.9200.25423:Monthly Rollup:https://support.microsoft.com/help/5055581",
          "product_ids": [
            "31",
            "30"
          ],
          "url": "https://support.microsoft.com/help/5055581"
        },
        {
          "category": "vendor_fix",
          "date": "2025-04-08T07:00:00.000Z",
          "details": "6.3.9600.22523:Monthly Rollup:https://support.microsoft.com/help/5055557",
          "product_ids": [
            "29",
            "28"
          ],
          "url": "https://support.microsoft.com/help/5055557"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "exploitCodeMaturity": "UNPROVEN",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "remediationLevel": "OFFICIAL_FIX",
            "reportConfidence": "CONFIRMED",
            "scope": "UNCHANGED",
            "temporalScore": 6.1,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11",
            "12",
            "13",
            "14",
            "15",
            "16",
            "17",
            "18",
            "19",
            "20",
            "21",
            "22",
            "23",
            "24",
            "25",
            "26",
            "27",
            "28",
            "29",
            "30",
            "31",
            "32",
            "33",
            "34",
            "35",
            "36",
            "37"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Elevation of Privilege"
        },
        {
          "category": "exploit_status",
          "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
        }
      ],
      "title": "Windows Graphics Component Elevation of Privilege Vulnerability"
    }
  ]
}
  ncsc-2025-0112
Vulnerability from csaf_ncscnl
Published
2025-04-08 18:57
    Modified
2025-04-08 18:57
    Summary
Kwetsbaarheden verholpen in Microsoft Windows
    Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
    Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
    Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- Uitvoer van willekeurige code (root/adminrechten)
- Uitvoer van willekeurige code (Gebruikersrechten)
- Verkrijgen van verhoogde rechten
- Toegang tot gevoelige gegevens
- Voordoen als andere gebruiker
Van de kwetsbaarheid met kenmerk CVE-2025-29824 geeft Microsoft aan dat deze eerder actief is misbruikt als zero-day. Er is geen publieke Proof-of-Concept (PoC) of exploitcode bekend. Een kwaadwillende die met succes deze kwetsbaarheid misbruikt, zou SYSTEM-rechten kunnen verkrijgen.
```
Windows Subsystem for Linux: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26675 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows upnphost.dll: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26665 | 7,00 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Mark of the Web (MOTW): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27472 | 5,40 | Omzeilen van beveiligingsmaatregel  | 
|----------------|------|-------------------------------------|
Windows Remote Desktop Services: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26671 | 8,10 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows Update Stack: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-21204 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27475 | 7,00 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Mobile Broadband: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-29811 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Standards-Based Storage Management Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27470 | 7,50 | Denial-of-Service                   | 
| CVE-2025-27486 | 7,50 | Denial-of-Service                   | 
| CVE-2025-26652 | 7,50 | Denial-of-Service                   | 
| CVE-2025-26680 | 7,50 | Denial-of-Service                   | 
| CVE-2025-27485 | 7,50 | Denial-of-Service                   | 
| CVE-2025-21174 | 7,50 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows Digital Media: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26640 | 7,00 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27467 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27476 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27730 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Kernel: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26648 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27739 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Remote Desktop Client: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27487 | 8,00 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows Virtualization-Based Security (VBS) Enclave: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27735 | 6,00 | Omzeilen van beveiligingsmaatregel  | 
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27728 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Resilient File System (ReFS): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27738 | 6,50 | Toegang tot gevoelige gegevens      | 
|----------------|------|-------------------------------------|
Windows Active Directory Certificate Services: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27740 | 8,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Power Dependency Coordinator: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27736 | 5,50 | Toegang tot gevoelige gegevens      | 
|----------------|------|-------------------------------------|
Windows Installer: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27727 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Bluetooth Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27490 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Hello: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26635 | 6,50 | Omzeilen van beveiligingsmaatregel  | 
| CVE-2025-26644 | 6,20 | Voordoen als andere gebruiker       | 
|----------------|------|-------------------------------------|
Windows Local Security Authority (LSA): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-21191 | 7,00 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27478 | 7,00 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
RPC Endpoint Mapper Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26679 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Kerberos: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-29809 | 7,10 | Omzeilen van beveiligingsmaatregel  | 
| CVE-2025-26647 | 8,10 | Voordoen als andere gebruiker       | 
| CVE-2025-27479 | 7,50 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows Cryptographic Services: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26641 | 7,50 | Denial-of-Service                   | 
| CVE-2025-29808 | 5,50 | Toegang tot gevoelige gegevens      | 
|----------------|------|-------------------------------------|
Windows NTFS: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27483 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27742 | 5,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-21197 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-27733 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27741 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Routing and Remote Access Service (RRAS): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26667 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-26672 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-26676 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-27474 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-21203 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-26664 | 6,50 | Toegang tot gevoelige gegevens      | 
| CVE-2025-26668 | 7,50 | Uitvoeren van willekeurige code     | 
| CVE-2025-26669 | 8,80 | Toegang tot gevoelige gegevens      | 
|----------------|------|-------------------------------------|
Windows Hyper-V: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27491 | 7,10 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Microsoft Streaming Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27471 | 5,90 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows Kernel Memory: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-29812 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Microsoft Virtual Hard Drive: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26688 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Security Zone Mapping: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27737 | 8,60 | Omzeilen van beveiligingsmaatregel  | 
|----------------|------|-------------------------------------|
OpenSSH for Windows: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27731 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Secure Channel: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27492 | 7,00 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-26649 | 7,00 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Remote Desktop Gateway Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27480 | 8,10 | Uitvoeren van willekeurige code     | 
| CVE-2025-27482 | 8,10 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows Win32K - GRFX: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26681 | 6,70 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-26687 | 7,50 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-27732 | 7,00 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Media: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26666 | 7,80 | Uitvoeren van willekeurige code     | 
| CVE-2025-26674 | 7,80 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows Common Log File System Driver: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-29824 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows HTTP.sys: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27473 | 7,50 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows Local Session Manager (LSM): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26651 | 6,50 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows USB Print Driver: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26639 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows TCP/IP: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26686 | 7,50 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows LDAP - Lightweight Directory Access Protocol: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26670 | 8,10 | Uitvoeren van willekeurige code     | 
| CVE-2025-27469 | 7,50 | Denial-of-Service                   | 
| CVE-2025-26663 | 8,10 | Uitvoeren van willekeurige code     | 
| CVE-2025-26673 | 7,50 | Denial-of-Service                   | 
|----------------|------|-------------------------------------|
Windows Universal Plug and Play (UPnP) Device Host: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27484 | 7,50 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows Telephony Service: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-21205 | 8,80 | Uitvoeren van willekeurige code     | 
| CVE-2025-21221 | 8,80 | Uitvoeren van willekeurige code     | 
| CVE-2025-21222 | 8,80 | Uitvoeren van willekeurige code     | 
| CVE-2025-27477 | 8,80 | Uitvoeren van willekeurige code     | 
| CVE-2025-27481 | 8,80 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Windows DWM Core Library: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-24073 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-24062 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-24058 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-24074 | 7,80 | Verkrijgen van verhoogde rechten    | 
| CVE-2025-24060 | 7,80 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
Windows BitLocker: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26637 | 6,80 | Omzeilen van beveiligingsmaatregel, Verkrijgen van verhoogde rechten | 
|----------------|------|-------------------------------------|
Windows Defender Application Control (WDAC): 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-26678 | 8,40 | Omzeilen van beveiligingsmaatregel  | 
|----------------|------|-------------------------------------|
Windows Shell: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-27729 | 7,80 | Uitvoeren van willekeurige code     | 
|----------------|------|-------------------------------------|
Active Directory Domain Services: 
|----------------|------|-------------------------------------|
| CVE-ID         | CVSS | Impact                              |
|----------------|------|-------------------------------------|
| CVE-2025-29810 | 7,50 | Verkrijgen van verhoogde rechten    | 
|----------------|------|-------------------------------------|
```
    Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
    Dreigingsinformatie
Kans
medium
    Schade
high
    CWE-591
Sensitive Data Storage in Improperly Locked Memory
    CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
    CWE-749
Exposed Dangerous Method or Function
    CWE-1390
Weak Authentication
    CWE-1039
Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
    CWE-59
Improper Link Resolution Before File Access ('Link Following')
    CWE-922
Insecure Storage of Sensitive Information
    CWE-822
Untrusted Pointer Dereference
    CWE-126
Buffer Over-read
    CWE-410
Insufficient Resource Pool
    CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
    CWE-415
Double Free
    CWE-908
Use of Uninitialized Resource
    CWE-345
Insufficient Verification of Data Authenticity
    CWE-190
Integer Overflow or Wraparound
    CWE-693
Protection Mechanism Failure
    CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
    CWE-125
Out-of-bounds Read
    CWE-284
Improper Access Control
    CWE-416
Use After Free
    CWE-400
Uncontrolled Resource Consumption
    CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
    CWE-122
Heap-based Buffer Overflow
    CWE-121
Stack-based Buffer Overflow
    CWE-20
Improper Input Validation
    {
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- Uitvoer van willekeurige code (root/adminrechten)\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Verkrijgen van verhoogde rechten\n- Toegang tot gevoelige gegevens\n- Voordoen als andere gebruiker\n\nVan de kwetsbaarheid met kenmerk CVE-2025-29824 geeft Microsoft aan dat deze eerder actief is misbruikt als zero-day. Er is geen publieke Proof-of-Concept (PoC) of exploitcode bekend. Een kwaadwillende die met succes deze kwetsbaarheid misbruikt, zou SYSTEM-rechten kunnen verkrijgen.\n\n```\nWindows Subsystem for Linux: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26675 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows upnphost.dll: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26665 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27472 | 5,40 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26671 | 8,10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Update Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-21204 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27475 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29811 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27470 | 7,50 | Denial-of-Service                   | \n| CVE-2025-27486 | 7,50 | Denial-of-Service                   | \n| CVE-2025-26652 | 7,50 | Denial-of-Service                   | \n| CVE-2025-26680 | 7,50 | Denial-of-Service                   | \n| CVE-2025-27485 | 7,50 | Denial-of-Service                   | \n| CVE-2025-21174 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Digital Media: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26640 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27467 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27476 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27730 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26648 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27739 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27487 | 8,00 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27735 | 6,00 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27728 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27738 | 6,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Active Directory Certificate Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27740 | 8,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Power Dependency Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27736 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27727 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Bluetooth Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27490 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26635 | 6,50 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-26644 | 6,20 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority (LSA): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-21191 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27478 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRPC Endpoint Mapper Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26679 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29809 | 7,10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-26647 | 8,10 | Voordoen als andere gebruiker       | \n| CVE-2025-27479 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26641 | 7,50 | Denial-of-Service                   | \n| CVE-2025-29808 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27483 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27742 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-21197 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-27733 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27741 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26667 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-26672 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-26676 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-27474 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-21203 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-26664 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-26668 | 7,50 | Uitvoeren van willekeurige code     | \n| CVE-2025-26669 | 8,80 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27491 | 7,10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27471 | 5,90 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Kernel Memory: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29812 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Virtual Hard Drive: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26688 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Security Zone Mapping: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27737 | 8,60 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nOpenSSH for Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27731 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Secure Channel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27492 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-26649 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Gateway Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27480 | 8,10 | Uitvoeren van willekeurige code     | \n| CVE-2025-27482 | 8,10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26681 | 6,70 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-26687 | 7,50 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-27732 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Media: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26666 | 7,80 | Uitvoeren van willekeurige code     | \n| CVE-2025-26674 | 7,80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29824 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows HTTP.sys: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27473 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Local Session Manager (LSM): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26651 | 6,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows USB Print Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26639 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26686 | 7,50 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows LDAP - Lightweight Directory Access Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26670 | 8,10 | Uitvoeren van willekeurige code     | \n| CVE-2025-27469 | 7,50 | Denial-of-Service                   | \n| CVE-2025-26663 | 8,10 | Uitvoeren van willekeurige code     | \n| CVE-2025-26673 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Universal Plug and Play (UPnP) Device Host: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27484 | 7,50 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Telephony Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-21205 | 8,80 | Uitvoeren van willekeurige code     | \n| CVE-2025-21221 | 8,80 | Uitvoeren van willekeurige code     | \n| CVE-2025-21222 | 8,80 | Uitvoeren van willekeurige code     | \n| CVE-2025-27477 | 8,80 | Uitvoeren van willekeurige code     | \n| CVE-2025-27481 | 8,80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-24073 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-24062 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-24058 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-24074 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-24060 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26637 | 6,80 | Omzeilen van beveiligingsmaatregel, Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Defender Application Control (WDAC): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-26678 | 8,40 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-27729 | 7,80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nActive Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-29810 | 7,50 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n```\n",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
        "title": "Oplossingen"
      },
      {
        "category": "description",
        "text": " ",
        "title": "Dreigingsinformatie"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Sensitive Data Storage in Improperly Locked Memory",
        "title": "CWE-591"
      },
      {
        "category": "general",
        "text": "Use of a Cryptographic Primitive with a Risky Implementation",
        "title": "CWE-1240"
      },
      {
        "category": "general",
        "text": "Exposed Dangerous Method or Function",
        "title": "CWE-749"
      },
      {
        "category": "general",
        "text": "Weak Authentication",
        "title": "CWE-1390"
      },
      {
        "category": "general",
        "text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism",
        "title": "CWE-1039"
      },
      {
        "category": "general",
        "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
        "title": "CWE-59"
      },
      {
        "category": "general",
        "text": "Insecure Storage of Sensitive Information",
        "title": "CWE-922"
      },
      {
        "category": "general",
        "text": "Untrusted Pointer Dereference",
        "title": "CWE-822"
      },
      {
        "category": "general",
        "text": "Buffer Over-read",
        "title": "CWE-126"
      },
      {
        "category": "general",
        "text": "Insufficient Resource Pool",
        "title": "CWE-410"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Double Free",
        "title": "CWE-415"
      },
      {
        "category": "general",
        "text": "Use of Uninitialized Resource",
        "title": "CWE-908"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Protection Mechanism Failure",
        "title": "CWE-693"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "title": "Kwetsbaarheden verholpen in Microsoft Windows",
    "tracking": {
      "current_release_date": "2025-04-08T18:57:53.660384Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0112",
      "initial_release_date": "2025-04-08T18:57:53.660384Z",
      "revision_history": [
        {
          "date": "2025-04-08T18:57:53.660384Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-1560265",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Microsoft Office for Android"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-1560266",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Microsoft Office for Universal"
              }
            ],
            "category": "product_family",
            "name": "Microsoft Office"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-1440176",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Remote Desktop client for Windows Desktop"
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/unknown",
                "product": {
                  "name": "vers:unknown/unknown",
                  "product_id": "CSAFPID-1332109"
                }
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.7970",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.7970",
                      "product_id": "CSAFPID-2633264",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1607 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.7970",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.7970",
                      "product_id": "CSAFPID-2633265",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7970:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1607 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7137",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7137",
                      "product_id": "CSAFPID-2633241",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1809 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7137",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7137",
                      "product_id": "CSAFPID-2633242",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7137:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 1809 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5737",
                      "product_id": "CSAFPID-2633247",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5737",
                      "product_id": "CSAFPID-2633248",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19044.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19044.5737",
                      "product_id": "CSAFPID-2633249",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5737:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 21H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5737",
                      "product_id": "CSAFPID-2633254",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5737",
                      "product_id": "CSAFPID-2633253",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.19045.5737",
                    "product": {
                      "name": "vers:microsoft/10.0.19045.5737",
                      "product_id": "CSAFPID-2633252",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5737:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 Version 22H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-2633262",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 for 32-bit Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-2633263",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 10 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22621.5191",
                    "product": {
                      "name": "vers:microsoft/10.0.22621.5191",
                      "product_id": "CSAFPID-2633250",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 22H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22621.5191",
                    "product": {
                      "name": "vers:microsoft/10.0.22621.5191",
                      "product_id": "CSAFPID-2633251",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5191:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 22H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22621.5191",
                    "product": {
                      "name": "vers:microsoft/10.0.22621.5191",
                      "product_id": "CSAFPID-2633256",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22621.5191:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 23H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.22631.5191",
                    "product": {
                      "name": "vers:microsoft/10.0.22631.5191",
                      "product_id": "CSAFPID-2633257",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5191:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 23H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.3775",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.3775",
                      "product_id": "CSAFPID-2633259",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:arm64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 24H2 for ARM64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.3775",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.3775",
                      "product_id": "CSAFPID-2633260",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.3775:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows 11 Version 24H2 for x64-based Systems"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/unknown",
                    "product": {
                      "name": "vers:microsoft/unknown",
                      "product_id": "CSAFPID-1440177",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows App Client for Windows Desktop"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.7970",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.7970",
                      "product_id": "CSAFPID-2633266",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2016"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.14393.7970",
                    "product": {
                      "name": "vers:microsoft/10.0.14393.7970",
                      "product_id": "CSAFPID-2633267",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7970:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2016 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7137",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7137",
                      "product_id": "CSAFPID-2633243",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2019"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.17763.7137",
                    "product": {
                      "name": "vers:microsoft/10.0.17763.7137",
                      "product_id": "CSAFPID-2633244",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7137:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2019 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.20348.3454",
                    "product": {
                      "name": "vers:microsoft/10.0.20348.3454",
                      "product_id": "CSAFPID-2633245",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2022"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.20348.3454",
                    "product": {
                      "name": "vers:microsoft/10.0.20348.3454",
                      "product_id": "CSAFPID-2633246",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3454:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2022 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.25398.1551",
                    "product": {
                      "name": "vers:microsoft/10.0.25398.1551",
                      "product_id": "CSAFPID-2633258",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1551:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.3775",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.3775",
                      "product_id": "CSAFPID-2633261",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2025"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/10.0.26100.3775",
                    "product": {
                      "name": "vers:microsoft/10.0.26100.3775",
                      "product_id": "CSAFPID-2633255",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2025 (Server Core installation)"
              }
            ],
            "category": "product_family",
            "name": "Windows"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.1.7601.27670",
                    "product": {
                      "name": "vers:microsoft/6.1.7601.27670",
                      "product_id": "CSAFPID-2633272",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.1.7601.27670",
                    "product": {
                      "name": "vers:microsoft/6.1.7601.27670",
                      "product_id": "CSAFPID-2633273",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27670:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23220",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23220",
                      "product_id": "CSAFPID-2633268",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for 32-bit Systems Service Pack 2"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23220",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23220",
                      "product_id": "CSAFPID-2633269",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23220",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23220",
                      "product_id": "CSAFPID-2633270",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for x64-based Systems Service Pack 2"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.0.6003.23220",
                    "product": {
                      "name": "vers:microsoft/6.0.6003.23220",
                      "product_id": "CSAFPID-2633271",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23220:*:*:*:*:*:x86:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.2.9200.25423",
                    "product": {
                      "name": "vers:microsoft/6.2.9200.25423",
                      "product_id": "CSAFPID-2633274",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2012"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.2.9200.25423",
                    "product": {
                      "name": "vers:microsoft/6.2.9200.25423",
                      "product_id": "CSAFPID-2633275",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25423:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2012 (Server Core installation)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.3.9600.22523",
                    "product": {
                      "name": "vers:microsoft/6.3.9600.22523",
                      "product_id": "CSAFPID-2633276",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2012 R2"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:microsoft/6.3.9600.22523",
                    "product": {
                      "name": "vers:microsoft/6.3.9600.22523",
                      "product_id": "CSAFPID-2633277",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22523:*:*:*:*:*:x64:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Windows Server 2012 R2 (Server Core installation)"
              }
            ],
            "category": "product_family",
            "name": "ESU"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-21174",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21174",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21174.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21174"
    },
    {
      "cve": "CVE-2025-21191",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21191",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21191.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21191"
    },
    {
      "cve": "CVE-2025-21197",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21197",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21197.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21197"
    },
    {
      "cve": "CVE-2025-21203",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21203",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21203.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21203"
    },
    {
      "cve": "CVE-2025-21204",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
          "title": "CWE-59"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21204",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21204.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21204"
    },
    {
      "cve": "CVE-2025-21205",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21205",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21205.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21205"
    },
    {
      "cve": "CVE-2025-21221",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21221",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21221.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21221"
    },
    {
      "cve": "CVE-2025-21222",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21222",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21222.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-21222"
    },
    {
      "cve": "CVE-2025-24058",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24058",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24058.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-24058"
    },
    {
      "cve": "CVE-2025-24060",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24060",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24060.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-24060"
    },
    {
      "cve": "CVE-2025-24062",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24062",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24062.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-24062"
    },
    {
      "cve": "CVE-2025-24073",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24073",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24073.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-24073"
    },
    {
      "cve": "CVE-2025-24074",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24074",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24074.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-24074"
    },
    {
      "cve": "CVE-2025-26635",
      "cwe": {
        "id": "CWE-1390",
        "name": "Weak Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Weak Authentication",
          "title": "CWE-1390"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26635",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26635.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26635"
    },
    {
      "cve": "CVE-2025-26637",
      "cwe": {
        "id": "CWE-693",
        "name": "Protection Mechanism Failure"
      },
      "notes": [
        {
          "category": "other",
          "text": "Protection Mechanism Failure",
          "title": "CWE-693"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26637",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26637.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26637"
    },
    {
      "cve": "CVE-2025-26639",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26639",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26639.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26639"
    },
    {
      "cve": "CVE-2025-26640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Double Free",
          "title": "CWE-415"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26640",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26640.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26640"
    },
    {
      "cve": "CVE-2025-26641",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26641",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26641.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26641"
    },
    {
      "cve": "CVE-2025-26644",
      "cwe": {
        "id": "CWE-1039",
        "name": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism",
          "title": "CWE-1039"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26644",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26644.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26644"
    },
    {
      "cve": "CVE-2025-26647",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26647",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26647.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26647"
    },
    {
      "cve": "CVE-2025-26648",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26648",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26648.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26648"
    },
    {
      "cve": "CVE-2025-26649",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26649",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26649.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26649"
    },
    {
      "cve": "CVE-2025-26651",
      "cwe": {
        "id": "CWE-749",
        "name": "Exposed Dangerous Method or Function"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposed Dangerous Method or Function",
          "title": "CWE-749"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26651",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26651.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26651"
    },
    {
      "cve": "CVE-2025-26652",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26652",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26652.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26652"
    },
    {
      "cve": "CVE-2025-26663",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26663",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26663.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26663"
    },
    {
      "cve": "CVE-2025-26664",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26664",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26664.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26664"
    },
    {
      "cve": "CVE-2025-26665",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26665",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26665.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26665"
    },
    {
      "cve": "CVE-2025-26666",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26666",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26666.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26666"
    },
    {
      "cve": "CVE-2025-26667",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26667",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26667.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26667"
    },
    {
      "cve": "CVE-2025-26668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26668",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26668.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26668"
    },
    {
      "cve": "CVE-2025-26669",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26669",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26669.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26669"
    },
    {
      "cve": "CVE-2025-26670",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26670",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26670.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26670"
    },
    {
      "cve": "CVE-2025-26671",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26671",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26671.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26671"
    },
    {
      "cve": "CVE-2025-26672",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26672",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26672.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26672"
    },
    {
      "cve": "CVE-2025-26673",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26673",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26673.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26673"
    },
    {
      "cve": "CVE-2025-26674",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26674",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26674.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26674"
    },
    {
      "cve": "CVE-2025-26675",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26675",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26675.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26675"
    },
    {
      "cve": "CVE-2025-26676",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26676",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26676.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26676"
    },
    {
      "cve": "CVE-2025-26678",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26678",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26678.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26678"
    },
    {
      "cve": "CVE-2025-26679",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26679",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26679.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26679"
    },
    {
      "cve": "CVE-2025-26680",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26680",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26680.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26680"
    },
    {
      "cve": "CVE-2025-26681",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26681",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26681.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26681"
    },
    {
      "cve": "CVE-2025-26686",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26686",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26686.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26686"
    },
    {
      "cve": "CVE-2025-26687",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26687",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26687.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26687"
    },
    {
      "cve": "CVE-2025-26688",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26688",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26688.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-26688"
    },
    {
      "cve": "CVE-2025-27467",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27467",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27467.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27467"
    },
    {
      "cve": "CVE-2025-27469",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27469",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27469.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27469"
    },
    {
      "cve": "CVE-2025-27470",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27470",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27470.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27470"
    },
    {
      "cve": "CVE-2025-27471",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27471",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27471.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27471"
    },
    {
      "cve": "CVE-2025-27472",
      "cwe": {
        "id": "CWE-693",
        "name": "Protection Mechanism Failure"
      },
      "notes": [
        {
          "category": "other",
          "text": "Protection Mechanism Failure",
          "title": "CWE-693"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27472",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27472.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27472"
    },
    {
      "cve": "CVE-2025-27473",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27473",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27473.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27473"
    },
    {
      "cve": "CVE-2025-27474",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of Uninitialized Resource",
          "title": "CWE-908"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27474",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27474.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27474"
    },
    {
      "cve": "CVE-2025-27475",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27475",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27475.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27475"
    },
    {
      "cve": "CVE-2025-27476",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27476",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27476.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27476"
    },
    {
      "cve": "CVE-2025-27477",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27477",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27477.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27477"
    },
    {
      "cve": "CVE-2025-27478",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27478",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27478.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27478"
    },
    {
      "cve": "CVE-2025-27479",
      "cwe": {
        "id": "CWE-410",
        "name": "Insufficient Resource Pool"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Resource Pool",
          "title": "CWE-410"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27479",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27479.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27479"
    },
    {
      "cve": "CVE-2025-27480",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27480",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27480.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27480"
    },
    {
      "cve": "CVE-2025-27481",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27481",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27481.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27481"
    },
    {
      "cve": "CVE-2025-27482",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27482",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27482.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27482"
    },
    {
      "cve": "CVE-2025-27483",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27483",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27483.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27483"
    },
    {
      "cve": "CVE-2025-27484",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27484",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27484.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27484"
    },
    {
      "cve": "CVE-2025-27485",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27485",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27485.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27485"
    },
    {
      "cve": "CVE-2025-27486",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27486",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27486.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27486"
    },
    {
      "cve": "CVE-2025-27487",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27487",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27487"
    },
    {
      "cve": "CVE-2025-27490",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27490",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27490.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27490"
    },
    {
      "cve": "CVE-2025-27491",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27491",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27491.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27491"
    },
    {
      "cve": "CVE-2025-27492",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27492"
    },
    {
      "cve": "CVE-2025-27727",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
          "title": "CWE-59"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27727",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27727.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27727"
    },
    {
      "cve": "CVE-2025-27728",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27728",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27728.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27728"
    },
    {
      "cve": "CVE-2025-27729",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27729",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27729.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27729"
    },
    {
      "cve": "CVE-2025-27730",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        },
        {
          "category": "other",
          "text": "Double Free",
          "title": "CWE-415"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27730",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27730.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27730"
    },
    {
      "cve": "CVE-2025-27731",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27731",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27731.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27731"
    },
    {
      "cve": "CVE-2025-27732",
      "cwe": {
        "id": "CWE-591",
        "name": "Sensitive Data Storage in Improperly Locked Memory"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Data Storage in Improperly Locked Memory",
          "title": "CWE-591"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27732",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27732.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27732"
    },
    {
      "cve": "CVE-2025-27733",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27733",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27733.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27733"
    },
    {
      "cve": "CVE-2025-27735",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27735",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27735.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27735"
    },
    {
      "cve": "CVE-2025-27736",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27736"
    },
    {
      "cve": "CVE-2025-27737",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27737",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27737.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27737"
    },
    {
      "cve": "CVE-2025-27738",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27738",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27738.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27738"
    },
    {
      "cve": "CVE-2025-27739",
      "cwe": {
        "id": "CWE-822",
        "name": "Untrusted Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Untrusted Pointer Dereference",
          "title": "CWE-822"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27739",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27739.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27739"
    },
    {
      "cve": "CVE-2025-27740",
      "cwe": {
        "id": "CWE-1390",
        "name": "Weak Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Weak Authentication",
          "title": "CWE-1390"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27740",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27740.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27740"
    },
    {
      "cve": "CVE-2025-27741",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27741",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27741.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27741"
    },
    {
      "cve": "CVE-2025-27742",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27742",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27742.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-27742"
    },
    {
      "cve": "CVE-2025-29808",
      "cwe": {
        "id": "CWE-1240",
        "name": "Use of a Cryptographic Primitive with a Risky Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use of a Cryptographic Primitive with a Risky Implementation",
          "title": "CWE-1240"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29808",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29808.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29808"
    },
    {
      "cve": "CVE-2025-29809",
      "cwe": {
        "id": "CWE-922",
        "name": "Insecure Storage of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insecure Storage of Sensitive Information",
          "title": "CWE-922"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29809",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29809.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29809"
    },
    {
      "cve": "CVE-2025-29810",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29810",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29810.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29810"
    },
    {
      "cve": "CVE-2025-29811",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29811",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29811.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29811"
    },
    {
      "cve": "CVE-2025-29812",
      "cwe": {
        "id": "CWE-822",
        "name": "Untrusted Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Untrusted Pointer Dereference",
          "title": "CWE-822"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29812",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29812.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29812"
    },
    {
      "cve": "CVE-2025-29824",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1560265",
          "CSAFPID-1560266",
          "CSAFPID-1440176",
          "CSAFPID-1332109",
          "CSAFPID-2633264",
          "CSAFPID-2633265",
          "CSAFPID-2633241",
          "CSAFPID-2633242",
          "CSAFPID-2633247",
          "CSAFPID-2633248",
          "CSAFPID-2633249",
          "CSAFPID-2633254",
          "CSAFPID-2633253",
          "CSAFPID-2633252",
          "CSAFPID-2633262",
          "CSAFPID-2633263",
          "CSAFPID-2633250",
          "CSAFPID-2633251",
          "CSAFPID-2633256",
          "CSAFPID-2633257",
          "CSAFPID-2633259",
          "CSAFPID-2633260",
          "CSAFPID-1440177",
          "CSAFPID-2633272",
          "CSAFPID-2633273",
          "CSAFPID-2633268",
          "CSAFPID-2633269",
          "CSAFPID-2633270",
          "CSAFPID-2633271",
          "CSAFPID-2633274",
          "CSAFPID-2633275",
          "CSAFPID-2633276",
          "CSAFPID-2633277",
          "CSAFPID-2633266",
          "CSAFPID-2633267",
          "CSAFPID-2633243",
          "CSAFPID-2633244",
          "CSAFPID-2633245",
          "CSAFPID-2633246",
          "CSAFPID-2633258",
          "CSAFPID-2633261",
          "CSAFPID-2633255"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-29824",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-29824.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1560265",
            "CSAFPID-1560266",
            "CSAFPID-1440176",
            "CSAFPID-1332109",
            "CSAFPID-2633264",
            "CSAFPID-2633265",
            "CSAFPID-2633241",
            "CSAFPID-2633242",
            "CSAFPID-2633247",
            "CSAFPID-2633248",
            "CSAFPID-2633249",
            "CSAFPID-2633254",
            "CSAFPID-2633253",
            "CSAFPID-2633252",
            "CSAFPID-2633262",
            "CSAFPID-2633263",
            "CSAFPID-2633250",
            "CSAFPID-2633251",
            "CSAFPID-2633256",
            "CSAFPID-2633257",
            "CSAFPID-2633259",
            "CSAFPID-2633260",
            "CSAFPID-1440177",
            "CSAFPID-2633272",
            "CSAFPID-2633273",
            "CSAFPID-2633268",
            "CSAFPID-2633269",
            "CSAFPID-2633270",
            "CSAFPID-2633271",
            "CSAFPID-2633274",
            "CSAFPID-2633275",
            "CSAFPID-2633276",
            "CSAFPID-2633277",
            "CSAFPID-2633266",
            "CSAFPID-2633267",
            "CSAFPID-2633243",
            "CSAFPID-2633244",
            "CSAFPID-2633245",
            "CSAFPID-2633246",
            "CSAFPID-2633258",
            "CSAFPID-2633261",
            "CSAFPID-2633255"
          ]
        }
      ],
      "title": "CVE-2025-29824"
    }
  ]
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…