Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-46701 (GCVE-0-2025-46701)
Vulnerability from cvelistv5
- CWE-178 - Improper Handling of Case Sensitivity
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.6 Version: 10.1.0-M1 ≤ 10.1.40 Version: 9.0.0.M1 ≤ 9.0.104 Version: 8.5.0 ≤ 8.5.100 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-05-29T22:03:08.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/05/29/4" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-46701", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-30T14:58:21.998219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-30T14:58:31.063Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "11.0.6", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.40", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "9.0.104", "status": "affected", "version": "9.0.0.M1", "versionType": "semver" }, { "lessThanOrEqual": "8.5.100", "status": "affected", "version": "8.5.0", "versionType": "semver" }, { "lessThan": "8.5.0", "status": "unknown", "version": "3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Greg K (https://github.com/gregk4sec)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.\u003c/p\u003e" } ], "value": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue." } ], "metrics": [ { "other": { "content": { "text": "low" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-178", "description": "CWE-178 Improper Handling of Case Sensitivity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T11:51:50.768Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Tomcat: Security constraint bypass for CGI scripts", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-46701", "datePublished": "2025-05-29T19:06:04.289Z", "dateReserved": "2025-04-28T12:28:07.568Z", "dateUpdated": "2025-08-08T11:51:50.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-46701\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-05-29T19:15:27.983\",\"lastModified\":\"2025-08-08T12:15:28.257\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\\n\\n\\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad de manejo incorrecto de la distinci\u00f3n entre may\u00fasculas y min\u00fasculas en el servlet GCI de Apache Tomcat permite eludir las restricciones de seguridad aplicables al componente pathInfo de una URI asignada al servlet CGI. Este problema afecta a Apache Tomcat: de la 11.0.0-M1 a la 11.0.6, de la 10.1.0-M1 a la 10.1.40 y de la 9.0.0.M1 a la 9.0.104. Se recomienda a los usuarios actualizar a las versiones 11.0.7, 10.1.41 o 9.0.105, que solucionan el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-178\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.0.105\",\"matchCriteriaId\":\"7F40F219-F606-447E-ACCD-D7A96093ED91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndExcluding\":\"10.1.41\",\"matchCriteriaId\":\"4BA93AAE-946D-4DF3-AF9F-36C83FB7F1CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.7\",\"matchCriteriaId\":\"6475FBD6-E85B-4926-813F-CAE6A742871A\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/05/29/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/05/29/4\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-05-29T22:03:08.967Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-46701\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-30T14:58:21.998219Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-30T14:58:15.690Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: Security constraint bypass for CGI scripts\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Greg K (https://github.com/gregk4sec)\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"low\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.6\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.40\"}, {\"status\": \"affected\", \"version\": \"9.0.0.M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.104\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.100\"}, {\"status\": \"unknown\", \"version\": \"3\", \"lessThan\": \"8.5.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\\n\\n\\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eImproper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\u003cbr\u003eThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \\nmay also be affected.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-178\", \"description\": \"CWE-178 Improper Handling of Case Sensitivity\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-08-08T11:51:50.768Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-46701\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-08T11:51:50.768Z\", \"dateReserved\": \"2025-04-28T12:28:07.568Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-05-29T19:06:04.289Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2025-1365
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, um beliebige Befehle auszuf\u00fchren und um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1365 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1365.json" }, { "category": "self", "summary": "WID-SEC-2025-1365 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1365" }, { "category": "external", "summary": "IBM Security Bulletin 7237317 vom 2025-06-19", "url": "https://www.ibm.com/support/pages/node/7237317" }, { "category": "external", "summary": "IBM Security Bulletin 7237316 vom 2025-06-19", "url": "https://www.ibm.com/support/pages/node/7237316" }, { "category": "external", "summary": "IBM Security Bulletin 7239757 vom 2025-07-15", "url": "https://www.ibm.com/support/pages/node/7239757" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-15T22:00:00.000+00:00", "generator": { "date": "2025-07-16T07:32:15.040+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1365", "initial_release_date": "2025-06-19T22:00:00.000+00:00", "revision_history": [ { "date": "2025-06-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP12 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP12 IF02", "product_id": "T044767" } }, { "category": "product_version", "name": "7.5.0 UP12 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP12 IF02", "product_id": "T044767-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0:up12_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-9840", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2016-9840" }, { "cve": "CVE-2020-11971", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2020-11971" }, { "cve": "CVE-2020-13790", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2020-13790" }, { "cve": "CVE-2022-49011", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2022-49011" }, { "cve": "CVE-2023-0286", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2024-12087", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12087" }, { "cve": "CVE-2024-12088", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12088" }, { "cve": "CVE-2024-12747", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-12747" }, { "cve": "CVE-2024-40906", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-40906" }, { "cve": "CVE-2024-43842", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-43842" }, { "cve": "CVE-2024-53141", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53141" }, { "cve": "CVE-2024-53150", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53150" }, { "cve": "CVE-2024-53241", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-53241" }, { "cve": "CVE-2024-8176", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2024-8176" }, { "cve": "CVE-2025-0395", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-0395" }, { "cve": "CVE-2025-22869", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-22869" }, { "cve": "CVE-2025-24528", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-24528" }, { "cve": "CVE-2025-31650", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-31650" }, { "cve": "CVE-2025-31651", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-31651" }, { "cve": "CVE-2025-46701", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-46701" }, { "cve": "CVE-2025-36050", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-36050" }, { "cve": "CVE-2025-33121", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-33121" }, { "cve": "CVE-2025-33117", "product_status": { "known_affected": [ "T044767", "T021415" ] }, "release_date": "2025-06-19T22:00:00.000+00:00", "title": "CVE-2025-33117" } ] }
wid-sec-w-2025-1165
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1165 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1165.json" }, { "category": "self", "summary": "WID-SEC-2025-1165 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1165" }, { "category": "external", "summary": "GitHub Advisory Database vom 2025-05-29", "url": "https://github.com/advisories/GHSA-h2fw-rfh5-95r3" }, { "category": "external", "summary": "OSS Security Mailing List vom 2025-05-29", "url": "https://seclists.org/oss-sec/2025/q2/184" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2025-019 vom 2025-06-24", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2025-019.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-019 vom 2025-06-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02214-1 vom 2025-07-03", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021747.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15301-1 vom 2025-07-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTOO3WDF3PKT7VMIVPGD3B6THLWKJFDW/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15302-1 vom 2025-07-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Q3VIWON6R2C3IL77AVMV6SIM4TZ245T/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15303-1 vom 2025-07-05", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L6B6HQCE7RRJR2L5C65YNRDK55ZWHNXT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02261-1 vom 2025-07-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021777.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02280-1 vom 2025-07-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021790.html" }, { "category": "external", "summary": "Atlassian Security Bulletin - July 15 2025", "url": "https://confluence.atlassian.com/security/security-bulletin-july-15-2025-1590658642.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4244 vom 2025-07-22", "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html" }, { "category": "external", "summary": "HCL Security Bulletin vom 2025-08-05", "url": "https://support.hcl-software.com/community?id=community_blog\u0026sys_id=4cd4383f3bcb26d828f8f547f4e45af6" } ], "source_lang": "en-US", "title": "Apache Tomcat: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2025-08-06T22:00:00.000+00:00", "generator": { "date": "2025-08-07T08:29:52.779+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1165", "initial_release_date": "2025-05-29T22:00:00.000+00:00", "revision_history": [ { "date": "2025-05-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-06-01T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: 2369253" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-07-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-07-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-15T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-05T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "12", "summary": "doppelter Eintrag entfernt" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.7", "product": { "name": "Apache Tomcat \u003c11.0.7", "product_id": "1776102" } }, { "category": "product_version", "name": "11.0.7", "product": { "name": "Apache Tomcat 11.0.7", "product_id": "1776102-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:11.0.7" } } }, { "category": "product_version_range", "name": "\u003c10.1.41", "product": { "name": "Apache Tomcat \u003c10.1.41", "product_id": "1776104" } }, { "category": "product_version", "name": "10.1.41", "product": { "name": "Apache Tomcat 10.1.41", "product_id": "1776104-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.1.41" } } }, { "category": "product_version_range", "name": "\u003c9.0.105", "product": { "name": "Apache Tomcat \u003c9.0.105", "product_id": "1776108" } }, { "category": "product_version", "name": "9.0.105", "product": { "name": "Apache Tomcat 9.0.105", "product_id": "1776108-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.105" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.6.4", "product": { "name": "Atlassian Bitbucket \u003c9.6.4", "product_id": "T045450" } }, { "category": "product_version", "name": "9.6.4", "product": { "name": "Atlassian Bitbucket 9.6.4", "product_id": "T045450-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:9.6.4" } } }, { "category": "product_version_range", "name": "\u003c9.4.8 (LTS)", "product": { "name": "Atlassian Bitbucket \u003c9.4.8 (LTS)", "product_id": "T045451" } }, { "category": "product_version", "name": "9.4.8 (LTS)", "product": { "name": "Atlassian Bitbucket 9.4.8 (LTS)", "product_id": "T045451-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:9.4.8_%28lts%29" } } }, { "category": "product_version_range", "name": "\u003c8.19.20 (LTS)", "product": { "name": "Atlassian Bitbucket \u003c8.19.20 (LTS)", "product_id": "T045452" } }, { "category": "product_version", "name": "8.19.20 (LTS)", "product": { "name": "Atlassian Bitbucket 8.19.20 (LTS)", "product_id": "T045452-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.19.20_%28lts%29" } } } ], "category": "product_name", "name": "Bitbucket" }, { "branches": [ { "category": "product_version_range", "name": "\u003c10.7.2", "product": { "name": "Atlassian Jira \u003c10.7.2", "product_id": "T045453" } }, { "category": "product_version", "name": "10.7.2", "product": { "name": "Atlassian Jira 10.7.2", "product_id": "T045453-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira:10.7.2" } } }, { "category": "product_version_range", "name": "\u003c10.3.8 (LTS)", "product": { "name": "Atlassian Jira \u003c10.3.8 (LTS)", "product_id": "T045454" } }, { "category": "product_version", "name": "10.3.8 (LTS)", "product": { "name": "Atlassian Jira 10.3.8 (LTS)", "product_id": "T045454-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira:10.3.8_%28lts%29" } } }, { "category": "product_version_range", "name": "\u003c9.12.25 (LTS)", "product": { "name": "Atlassian Jira \u003c9.12.25 (LTS)", "product_id": "T045455" } }, { "category": "product_version", "name": "9.12.25 (LTS)", "product": { "name": "Atlassian Jira 9.12.25 (LTS)", "product_id": "T045455-fixed", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira:9.12.25_%28lts%29" } } } ], "category": "product_name", "name": "Jira" } ], "category": "vendor", "name": "Atlassian" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.18.2", "product": { "name": "HCL Commerce \u003c9.1.18.2", "product_id": "T045896" } }, { "category": "product_version", "name": "9.1.18.2", "product": { "name": "HCL Commerce 9.1.18.2", "product_id": "T045896-fixed", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:9.1.18.2" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "product_status": { "known_affected": [ "1776102", "T045896", "2951", "T002207", "T027843", "1776108", "398363", "T045451", "T045450", "1776104", "T045453", "T045452", "T045455", "T045454" ] }, "release_date": "2025-05-29T22:00:00.000+00:00", "title": "CVE-2025-46701" } ] }
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2019-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2126" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" }, { "name": "CVE-2019-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2021-45943", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45943" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2022-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-41862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-40898", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-5870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870" }, { "name": "CVE-2022-0543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0543" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2024-1580", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1580" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-23807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23807" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2023-5752", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-6228", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-24788", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788" }, { "name": "CVE-2024-7348", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7348" }, { "name": "CVE-2023-7008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2022-48468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468" }, { "name": "CVE-2023-48161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-10976", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10976" }, { "name": "CVE-2024-10977", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10977" }, { "name": "CVE-2024-10978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10978" }, { "name": "CVE-2024-10979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10979" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2025-21490", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490" }, { "name": "CVE-2025-21491", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491" }, { "name": "CVE-2025-21497", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497" }, { "name": "CVE-2025-21500", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500" }, { "name": "CVE-2025-21501", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501" }, { "name": "CVE-2025-21503", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503" }, { "name": "CVE-2025-21505", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505" }, { "name": "CVE-2025-21519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519" }, { "name": "CVE-2025-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529" }, { "name": "CVE-2025-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540" }, { "name": "CVE-2025-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546" }, { "name": "CVE-2025-21555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555" }, { "name": "CVE-2025-21559", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2024-12797", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2022-42967", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42967" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-27363", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2012-0880", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880" }, { "name": "CVE-2017-17507", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17507" }, { "name": "CVE-2017-8806", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8806" }, { "name": "CVE-2018-10126", "url": "https://www.cve.org/CVERecord?id=CVE-2018-10126" }, { "name": "CVE-2018-11205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11205" }, { "name": "CVE-2018-13866", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13866" }, { "name": "CVE-2018-13867", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13867" }, { "name": "CVE-2018-13868", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13868" }, { "name": "CVE-2018-13869", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13869" }, { "name": "CVE-2018-13870", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13870" }, { "name": "CVE-2018-13871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13871" }, { "name": "CVE-2018-13872", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13872" }, { "name": "CVE-2018-13874", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13874" }, { "name": "CVE-2018-13875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13875" }, { "name": "CVE-2018-13876", "url": "https://www.cve.org/CVERecord?id=CVE-2018-13876" }, { "name": "CVE-2018-14031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14031" }, { "name": "CVE-2018-14033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14033" }, { "name": "CVE-2018-14034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14034" }, { "name": "CVE-2018-14035", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14035" }, { "name": "CVE-2018-14460", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14460" }, { "name": "CVE-2018-15671", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15671" }, { "name": "CVE-2018-16438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16438" }, { "name": "CVE-2018-17432", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17432" }, { "name": "CVE-2018-17433", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17433" }, { "name": "CVE-2018-17434", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17434" }, { "name": "CVE-2018-17435", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17435" }, { "name": "CVE-2018-17436", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17436" }, { "name": "CVE-2018-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17437" }, { "name": "CVE-2018-17438", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17438" }, { "name": "CVE-2018-17439", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17439" }, { "name": "CVE-2019-20005", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20005" }, { "name": "CVE-2019-20006", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20006" }, { "name": "CVE-2019-20007", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20007" }, { "name": "CVE-2019-20198", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20198" }, { "name": "CVE-2019-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20199" }, { "name": "CVE-2019-20200", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20200" }, { "name": "CVE-2019-20201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20201" }, { "name": "CVE-2019-20202", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20202" }, { "name": "CVE-2019-6988", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6988" }, { "name": "CVE-2019-8396", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8396" }, { "name": "CVE-2019-8397", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8397" }, { "name": "CVE-2019-8398", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8398" }, { "name": "CVE-2019-9151", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9151" }, { "name": "CVE-2019-9152", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9152" }, { "name": "CVE-2020-10809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10809" }, { "name": "CVE-2020-10810", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10810" }, { "name": "CVE-2020-10811", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10811" }, { "name": "CVE-2020-10812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10812" }, { "name": "CVE-2020-18232", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18232" }, { "name": "CVE-2020-18494", "url": "https://www.cve.org/CVERecord?id=CVE-2020-18494" }, { "name": "CVE-2021-26220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26220" }, { "name": "CVE-2021-26221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26221" }, { "name": "CVE-2021-26222", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26222" }, { "name": "CVE-2021-30485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30485" }, { "name": "CVE-2021-31229", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31229" }, { "name": "CVE-2021-31347", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31347" }, { "name": "CVE-2021-31348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31348" }, { "name": "CVE-2021-31598", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31598" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2021-37501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501" }, { "name": "CVE-2021-45829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45829" }, { "name": "CVE-2021-45830", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45830" }, { "name": "CVE-2021-45832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45832" }, { "name": "CVE-2021-45833", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45833" }, { "name": "CVE-2021-46242", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46242" }, { "name": "CVE-2021-46243", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46243" }, { "name": "CVE-2021-46244", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46244" }, { "name": "CVE-2022-25942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25942" }, { "name": "CVE-2022-25972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25972" }, { "name": "CVE-2022-26061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26061" }, { "name": "CVE-2022-30045", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30045" }, { "name": "CVE-2022-4055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055" }, { "name": "CVE-2022-47655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47655" }, { "name": "CVE-2023-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0996" }, { "name": "CVE-2023-29659", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29659" }, { "name": "CVE-2023-32570", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32570" }, { "name": "CVE-2023-39328", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39328" }, { "name": "CVE-2023-39329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39329" }, { "name": "CVE-2023-51792", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51792" }, { "name": "CVE-2023-6879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6879" }, { "name": "CVE-2024-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27304" }, { "name": "CVE-2024-29157", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157" }, { "name": "CVE-2024-29158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158" }, { "name": "CVE-2024-29159", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159" }, { "name": "CVE-2024-29160", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160" }, { "name": "CVE-2024-29161", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161" }, { "name": "CVE-2024-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162" }, { "name": "CVE-2024-29163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163" }, { "name": "CVE-2024-29164", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164" }, { "name": "CVE-2024-29165", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165" }, { "name": "CVE-2024-29166", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29166" }, { "name": "CVE-2024-32605", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605" }, { "name": "CVE-2024-32606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32606" }, { "name": "CVE-2024-32607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32607" }, { "name": "CVE-2024-32608", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608" }, { "name": "CVE-2024-32609", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609" }, { "name": "CVE-2024-32610", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32610" }, { "name": "CVE-2024-32611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611" }, { "name": "CVE-2024-32612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612" }, { "name": "CVE-2024-32613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613" }, { "name": "CVE-2024-32614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614" }, { "name": "CVE-2024-32615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615" }, { "name": "CVE-2024-32616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616" }, { "name": "CVE-2024-32617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617" }, { "name": "CVE-2024-32618", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618" }, { "name": "CVE-2024-32619", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619" }, { "name": "CVE-2024-32620", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620" }, { "name": "CVE-2024-32621", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621" }, { "name": "CVE-2024-32622", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622" }, { "name": "CVE-2024-32623", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623" }, { "name": "CVE-2024-32624", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624" }, { "name": "CVE-2024-33873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873" }, { "name": "CVE-2024-33874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874" }, { "name": "CVE-2024-33875", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33875" }, { "name": "CVE-2024-33876", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33876" }, { "name": "CVE-2024-33877", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877" }, { "name": "CVE-2024-34402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34402" }, { "name": "CVE-2024-34403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34403" }, { "name": "CVE-2024-38949", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38949" }, { "name": "CVE-2024-38950", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38950" }, { "name": "CVE-2024-41996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41996" }, { "name": "CVE-2024-45993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45993" }, { "name": "CVE-2024-46981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46981" }, { "name": "CVE-2024-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49203" }, { "name": "CVE-2024-5171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5171" }, { "name": "CVE-2024-51741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51741" }, { "name": "CVE-2024-52522", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52522" }, { "name": "CVE-2024-52616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2024-56378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56378" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2024-56826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56826" }, { "name": "CVE-2024-56827", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56827" }, { "name": "CVE-2024-6716", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6716" }, { "name": "CVE-2025-2153", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2153" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-23022", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23022" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" } ], "initial_release_date": "2025-06-19T00:00:00", "last_revision_date": "2025-06-19T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0524", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-19T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35841", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35844", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35843", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35842", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35846", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35849", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35840", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35847", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35839", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35845", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845" }, { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35848", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848" } ] }
CERTFR-2025-AVI-0461
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Apache Tomcat. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tomcat versions 10.1.x ant\u00e9rieures \u00e0 10.1.41", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } }, { "description": "Tomcat versions 9.0.x ant\u00e9rieures \u00e0 9.0.105", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } }, { "description": "Tomcat versions 11.0.x ant\u00e9rieures \u00e0 11.0.7", "product": { "name": "Tomcat", "vendor": { "name": "Apache", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" } ], "initial_release_date": "2025-05-30T00:00:00", "last_revision_date": "2025-05-30T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0461", "revisions": [ { "description": "Version initiale", "revision_date": "2025-05-30T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Apache Tomcat. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.", "title": "Vuln\u00e9rabilit\u00e9 dans Apache Tomcat", "vendor_advisories": [ { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_11.0.7", "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.7" }, { "published_at": "2025-05-12", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_9.0.105", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.105" }, { "published_at": "2025-05-12", "title": "Bulletin de s\u00e9curit\u00e9 Apache Tomcat Apache_Tomcat_10.1.41", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.41" } ] }
CERTFR-2025-AVI-0593
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Atlassian | Jira | Jira Service Management Data Center versions 10.x antérieures à 10.7.2 | ||
Atlassian | Jira | Jira Service Management Server versions 10.x antérieures à 10.3.8 LTS | ||
Atlassian | Jira | Jira Software Data Center versions 10.x antérieures à 10.7.2 | ||
Atlassian | Jira | Jira Software Server versions 9.x antérieures à 9.12.25 LTS | ||
Atlassian | Jira | Jira Software Server versions 10.x antérieures à 10.7.2 | ||
Atlassian | Jira | Jira Service Management Data Center versions antérieures à 10.3.8 LTS | ||
Atlassian | Jira | Jira Service Management Server versions 10.x antérieures à 10.7.2 | ||
Atlassian | Confluence | Confluence Server versions 9.x antérieures à 9.5.2 | ||
Atlassian | Confluence | Confluence Server versions 9.x antérieures à 9.2.6 LTS | ||
Atlassian | Jira | Jira Software Data Center versions 10.x antérieures à 10.3.8 LTS | ||
Atlassian | Confluence | Confluence Data Center versions 9.x antérieures à 9.2.6 LTS | ||
Atlassian | Jira | Jira Service Management Data Center versions 5.x antérieures à 5.12.25 LTS | ||
Atlassian | Jira | Jira Service Management Server versions 5.x antérieures à 5.12.25 LTS | ||
Atlassian | Jira | Jira Software Data Center versions 9.x antérieures à 9.12.25 LTS | ||
Atlassian | Jira | Jira Software Server versions 10.x antérieures à 10.3.8 LTS | ||
Atlassian | Confluence | Confluence Data Center versions 9.x antérieures à 9.5.2 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Jira Service Management Data Center versions 10.x ant\u00e9rieures \u00e0 10.7.2", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.3.8 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Data Center versions 10.x ant\u00e9rieures \u00e0 10.7.2", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Server versions 9.x ant\u00e9rieures \u00e0 9.12.25 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.7.2", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.8 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.7.2", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.5.2", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.2.6 LTS", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.8 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.2.6 LTS", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Data Center versions 5.x ant\u00e9rieures \u00e0 5.12.25 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Service Management Server versions 5.x ant\u00e9rieures \u00e0 5.12.25 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Data Center versions 9.x ant\u00e9rieures \u00e0 9.12.25 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.3.8 LTS", "product": { "name": "Jira", "vendor": { "name": "Atlassian", "scada": false } } }, { "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.5.2", "product": { "name": "Confluence", "vendor": { "name": "Atlassian", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27820" }, { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" } ], "initial_release_date": "2025-07-16T00:00:00", "last_revision_date": "2025-07-16T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0593", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian", "vendor_advisories": [ { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26443", "url": "https://jira.atlassian.com/browse/JSWSERVER-26443" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16310", "url": "https://jira.atlassian.com/browse/JSDSERVER-16310" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26442", "url": "https://jira.atlassian.com/browse/JSWSERVER-26442" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16309", "url": "https://jira.atlassian.com/browse/JSDSERVER-16309" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26470", "url": "https://jira.atlassian.com/browse/JSWSERVER-26470" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26468", "url": "https://jira.atlassian.com/browse/JSWSERVER-26468" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16269", "url": "https://jira.atlassian.com/browse/JSDSERVER-16269" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26469", "url": "https://jira.atlassian.com/browse/JSWSERVER-26469" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16308", "url": "https://jira.atlassian.com/browse/JSDSERVER-16308" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16311", "url": "https://jira.atlassian.com/browse/JSDSERVER-16311" }, { "published_at": "2025-07-15", "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-100164", "url": "https://jira.atlassian.com/browse/CONFSERVER-100164" } ] }
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2023-1175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1175" }, { "name": "CVE-2022-2817", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2817" }, { "name": "CVE-2022-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2182" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2023-4504", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4504" }, { "name": "CVE-2022-2874", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2874" }, { "name": "CVE-2025-25724", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25724" }, { "name": "CVE-2024-7531", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7531" }, { "name": "CVE-2021-25317", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25317" }, { "name": "CVE-2021-3968", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3968" }, { "name": "CVE-2023-48237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48237" }, { "name": "CVE-2022-2344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2344" }, { "name": "CVE-2023-48706", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48706" }, { "name": "CVE-2022-3016", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3016" }, { "name": "CVE-2023-7216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7216" }, { "name": "CVE-2024-52615", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52615" }, { "name": "CVE-2021-31535", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31535" }, { "name": "CVE-2022-2285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2285" }, { "name": "CVE-2022-2208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2208" }, { "name": "CVE-2022-2982", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2982" }, { "name": "CVE-2023-5441", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5441" }, { "name": "CVE-2022-2287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2287" }, { "name": "CVE-2022-3153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3153" }, { "name": "CVE-2022-2946", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2946" }, { "name": "CVE-2022-2862", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2862" }, { "name": "CVE-2022-2889", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2889" }, { "name": "CVE-2021-4173", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4173" }, { "name": "CVE-2020-12413", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12413" }, { "name": "CVE-2025-4330", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330" }, { "name": "CVE-2023-48235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48235" }, { "name": "CVE-2023-0051", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0051" }, { "name": "CVE-2024-43374", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43374" }, { "name": "CVE-2025-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138" }, { "name": "CVE-2024-41957", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41957" }, { "name": "CVE-2023-4781", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4781" }, { "name": "CVE-2023-48231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48231" }, { "name": "CVE-2023-2609", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2609" }, { "name": "CVE-2022-3324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3324" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2023-1170", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1170" }, { "name": "CVE-2022-2257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2257" }, { "name": "CVE-2024-45306", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45306" }, { "name": "CVE-2023-4751", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4751" }, { "name": "CVE-2021-4136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4136" }, { "name": "CVE-2023-4738", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4738" }, { "name": "CVE-2021-3928", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3928" }, { "name": "CVE-2015-1197", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1197" }, { "name": "CVE-2023-48233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48233" }, { "name": "CVE-2022-2042", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2042" }, { "name": "CVE-2022-2183", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2183" }, { "name": "CVE-2024-29040", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29040" }, { "name": "CVE-2017-1000383", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383" }, { "name": "CVE-2025-47268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268" }, { "name": "CVE-2022-2304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2304" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2022-2819", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2819" }, { "name": "CVE-2022-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3705" }, { "name": "CVE-2023-1264", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1264" }, { "name": "CVE-2022-4293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4293" }, { "name": "CVE-2025-26603", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26603" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2022-3234", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3234" }, { "name": "CVE-2022-2126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2126" }, { "name": "CVE-2021-3973", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3973" }, { "name": "CVE-2021-4166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4166" }, { "name": "CVE-2022-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3256" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2022-2343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2343" }, { "name": "CVE-2022-2849", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2849" }, { "name": "CVE-2025-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4565" }, { "name": "CVE-2022-3235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3235" }, { "name": "CVE-2022-2980", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2980" }, { "name": "CVE-2024-41965", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41965" }, { "name": "CVE-2022-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3134" }, { "name": "CVE-2023-0512", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0512" }, { "name": "CVE-2022-2175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2175" }, { "name": "CVE-2022-3297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3297" }, { "name": "CVE-2022-0213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213" }, { "name": "CVE-2022-1616", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1616" }, { "name": "CVE-2023-48236", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48236" }, { "name": "CVE-2025-4435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435" }, { "name": "CVE-2024-47814", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47814" }, { "name": "CVE-2022-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2923" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2022-2284", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2284" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2024-53920", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920" }, { "name": "CVE-2022-2286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2286" }, { "name": "CVE-2023-45803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803" }, { "name": "CVE-2022-3352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3352" }, { "name": "CVE-2023-0054", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0054" }, { "name": "CVE-2025-31344", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31344" }, { "name": "CVE-2025-24014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24014" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2022-3296", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3296" }, { "name": "CVE-2021-45261", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45261" }, { "name": "CVE-2022-42889", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42889" }, { "name": "CVE-2023-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0433" }, { "name": "CVE-2022-2345", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2345" }, { "name": "CVE-2021-3974", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3974" }, { "name": "CVE-2022-2845", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2845" }, { "name": "CVE-2022-2210", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2210" }, { "name": "CVE-2022-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1725" }, { "name": "CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "name": "CVE-2023-4735", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4735" }, { "name": "CVE-2023-4734", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4734" }, { "name": "CVE-2023-2610", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2610" }, { "name": "CVE-2025-29768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29768" }, { "name": "CVE-2022-1620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1620" }, { "name": "CVE-2023-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5535" }, { "name": "CVE-2022-1720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1720" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2022-4292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4292" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-22134", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22134" }, { "name": "CVE-2025-1215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1215" }, { "name": "CVE-2023-48232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48232" }, { "name": "CVE-2022-2522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2522" }, { "name": "CVE-2022-2129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2129" }, { "name": "CVE-2023-48234", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48234" }, { "name": "CVE-2022-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0351" }, { "name": "CVE-2024-22667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667" }, { "name": "CVE-2023-46246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46246" }, { "name": "CVE-2025-27151", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27151" }, { "name": "CVE-2024-43802", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43802" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-5702", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5702" }, { "name": "CVE-2023-0288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0288" }, { "name": "CVE-2025-52968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52968" }, { "name": "CVE-2022-3037", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3037" }, { "name": "CVE-2022-1674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1674" }, { "name": "CVE-2022-3278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3278" }, { "name": "CVE-2022-2206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2206" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2022-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2124" }, { "name": "CVE-2023-7207", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7207" }, { "name": "CVE-2022-1619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1619" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2022-4141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4141" }, { "name": "CVE-2022-3099", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3099" }, { "name": "CVE-2021-4187", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4187" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2021-3927", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3927" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2021-34141", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141" }, { "name": "CVE-2023-0049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0049" }, { "name": "CVE-2023-5344", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5344" }, { "name": "CVE-2021-33430", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430" }, { "name": "CVE-2022-2125", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2125" }, { "name": "CVE-2022-2207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2207" }, { "name": "CVE-2017-6519", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6519" }, { "name": "CVE-2025-3576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576" }, { "name": "CVE-2023-1127", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1127" } ], "initial_release_date": "2025-07-11T00:00:00", "last_revision_date": "2025-07-11T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0585", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu", "vendor_advisories": [ { "published_at": "2025-07-11", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35935", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935" }, { "published_at": "2025-07-10", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35934", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934" }, { "published_at": "2025-07-10", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35931", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931" } ] }
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11", "product": { "name": "Tanzu Application Service", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11", "product": { "name": "Tanzu Application Service", "vendor": { "name": "VMware", "scada": false } } }, { "description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2020-8908", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908" }, { "name": "CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "name": "CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "name": "CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "name": "CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "name": "CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "name": "CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "name": "CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "name": "CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "name": "CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "name": "CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "name": "CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "name": "CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "name": "CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "name": "CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "name": "CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "name": "CVE-2022-32205", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205" }, { "name": "CVE-2022-32206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206" }, { "name": "CVE-2022-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996" }, { "name": "CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "name": "CVE-2022-1434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434" }, { "name": "CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "name": "CVE-2022-1343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343" }, { "name": "CVE-2022-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473" }, { "name": "CVE-2022-27774", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774" }, { "name": "CVE-2022-27775", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775" }, { "name": "CVE-2022-22576", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576" }, { "name": "CVE-2022-27776", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776" }, { "name": "CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "name": "CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "name": "CVE-2022-2097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097" }, { "name": "CVE-2022-25647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647" }, { "name": "CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "name": "CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "name": "CVE-2022-27782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782" }, { "name": "CVE-2022-32208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208" }, { "name": "CVE-2022-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781" }, { "name": "CVE-2022-32207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207" }, { "name": "CVE-2022-3358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2022-32221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221" }, { "name": "CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "name": "CVE-2022-35252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252" }, { "name": "CVE-2022-42915", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915" }, { "name": "CVE-2022-43551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551" }, { "name": "CVE-2022-43552", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2022-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-23915", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915" }, { "name": "CVE-2023-23914", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914" }, { "name": "CVE-2023-23916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916" }, { "name": "CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "name": "CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "name": "CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "name": "CVE-2022-41716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41716" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2023-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465" }, { "name": "CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "name": "CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "name": "CVE-2022-41722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41722" }, { "name": "CVE-2022-30580", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580" }, { "name": "CVE-2022-41720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41720" }, { "name": "CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "name": "CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "name": "CVE-2023-24532", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532" }, { "name": "CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2022-30634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30634" }, { "name": "CVE-2023-27533", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533" }, { "name": "CVE-2023-27534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534" }, { "name": "CVE-2022-27780", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780" }, { "name": "CVE-2022-29804", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29804" }, { "name": "CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "name": "CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "name": "CVE-2023-1255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255" }, { "name": "CVE-2023-28322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322" }, { "name": "CVE-2023-28320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320" }, { "name": "CVE-2023-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321" }, { "name": "CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "name": "CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "name": "CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "name": "CVE-2023-2975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-28319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404" }, { "name": "CVE-2023-29402", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402" }, { "name": "CVE-2023-29403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403" }, { "name": "CVE-2023-29405", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405" }, { "name": "CVE-2023-2976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976" }, { "name": "CVE-2023-29409", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409" }, { "name": "CVE-2023-29406", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406" }, { "name": "CVE-2023-40403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2023-33201", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33201" }, { "name": "CVE-2016-1000027", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-40217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217" }, { "name": "CVE-2022-0563", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0563" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-39323", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323" }, { "name": "CVE-2023-36617", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36617" }, { "name": "CVE-2022-23471", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471" }, { "name": "CVE-2023-25153", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153" }, { "name": "CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2023-39318", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318" }, { "name": "CVE-2023-39319", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "name": "CVE-2023-25173", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173" }, { "name": "CVE-2022-31030", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-36632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632" }, { "name": "CVE-2024-28085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2020-22916", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916" }, { "name": "CVE-2023-3978", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978" }, { "name": "CVE-2023-2253", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253" }, { "name": "CVE-2024-25710", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710" }, { "name": "CVE-2024-26308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2024-21011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011" }, { "name": "CVE-2024-21094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094" }, { "name": "CVE-2024-21068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21068" }, { "name": "CVE-2024-21085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085" }, { "name": "CVE-2024-21012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21012" }, { "name": "CVE-2023-28841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28841" }, { "name": "CVE-2023-28842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28842" }, { "name": "CVE-2023-39326", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326" }, { "name": "CVE-2023-45283", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45283" }, { "name": "CVE-2023-28840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28840" }, { "name": "CVE-2023-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285" }, { "name": "CVE-2023-45284", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-6378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378" }, { "name": "CVE-2023-45289", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289" }, { "name": "CVE-2023-45290", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290" }, { "name": "CVE-2024-24783", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783" }, { "name": "CVE-2024-24784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784" }, { "name": "CVE-2024-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2024-35255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255" }, { "name": "CVE-2024-24557", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24557" }, { "name": "CVE-2024-24786", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786" }, { "name": "CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-4030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-21131", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131" }, { "name": "CVE-2024-21138", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138" }, { "name": "CVE-2024-21140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140" }, { "name": "CVE-2024-21144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144" }, { "name": "CVE-2024-21145", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145" }, { "name": "CVE-2024-21147", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147" }, { "name": "CVE-2023-28756", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28756" }, { "name": "CVE-2024-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923" }, { "name": "CVE-2024-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219" }, { "name": "CVE-2023-45287", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287" }, { "name": "CVE-2024-24787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2022-24769", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24769" }, { "name": "CVE-2024-41110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41110" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2024-7264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264" }, { "name": "CVE-2024-8096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-24789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789" }, { "name": "CVE-2024-34155", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155" }, { "name": "CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "name": "CVE-2024-34158", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "name": "CVE-2024-21208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208" }, { "name": "CVE-2024-21210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210" }, { "name": "CVE-2024-21217", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217" }, { "name": "CVE-2024-21235", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2024-34447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-8088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088" }, { "name": "CVE-2024-9681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2024-50047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047" }, { "name": "CVE-2024-11053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053" }, { "name": "CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "name": "CVE-2024-53051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051" }, { "name": "CVE-2024-0406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0406" }, { "name": "CVE-2024-53144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144" }, { "name": "CVE-2024-8805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805" }, { "name": "CVE-2025-21502", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21502" }, { "name": "CVE-2024-27282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2024-56664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2025-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725" }, { "name": "CVE-2024-50602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2024-24791", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791" }, { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2023-24531", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2020-36843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36843" }, { "name": "CVE-2025-21587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587" }, { "name": "CVE-2025-30691", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30691" }, { "name": "CVE-2025-30698", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30698" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-21941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941" }, { "name": "CVE-2025-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956" }, { "name": "CVE-2025-21957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957" }, { "name": "CVE-2025-21959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959" }, { "name": "CVE-2025-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962" }, { "name": "CVE-2025-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963" }, { "name": "CVE-2025-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964" }, { "name": "CVE-2025-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968" }, { "name": "CVE-2025-21970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970" }, { "name": "CVE-2025-21975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975" }, { "name": "CVE-2025-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981" }, { "name": "CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "name": "CVE-2025-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992" }, { "name": "CVE-2025-21994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999" }, { "name": "CVE-2025-22004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004" }, { "name": "CVE-2025-22005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2025-22008", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008" }, { "name": "CVE-2025-22010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010" }, { "name": "CVE-2025-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014" }, { "name": "CVE-2020-15250", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250" }, { "name": "CVE-2024-12798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798" }, { "name": "CVE-2024-12801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801" }, { "name": "CVE-2024-29018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29018" }, { "name": "CVE-2025-21613", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21613" }, { "name": "CVE-2025-21614", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21614" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2023-53034", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034" }, { "name": "CVE-2025-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025" }, { "name": "CVE-2025-22035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035" }, { "name": "CVE-2025-22044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044" }, { "name": "CVE-2025-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045" }, { "name": "CVE-2025-22050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050" }, { "name": "CVE-2025-22054", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054" }, { "name": "CVE-2025-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055" }, { "name": "CVE-2025-22056", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056" }, { "name": "CVE-2025-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060" }, { "name": "CVE-2025-22063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063" }, { "name": "CVE-2025-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066" }, { "name": "CVE-2025-22071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071" }, { "name": "CVE-2025-22073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073" }, { "name": "CVE-2025-22075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075" }, { "name": "CVE-2025-22079", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079" }, { "name": "CVE-2025-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081" }, { "name": "CVE-2025-22086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086" }, { "name": "CVE-2025-22089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089" }, { "name": "CVE-2025-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097" }, { "name": "CVE-2025-23136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136" }, { "name": "CVE-2025-23138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-38152", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152" }, { "name": "CVE-2025-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575" }, { "name": "CVE-2025-38637", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637" }, { "name": "CVE-2025-39728", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2025-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-4575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4575" }, { "name": "CVE-2022-49728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728" }, { "name": "CVE-2024-58093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093" }, { "name": "CVE-2025-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018" }, { "name": "CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021" }, { "name": "CVE-2025-37889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889" }, { "name": "CVE-2025-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937" }, { "name": "CVE-2025-37890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890" }, { "name": "CVE-2025-37932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2025-4330", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330" }, { "name": "CVE-2025-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2025-4435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435" }, { "name": "CVE-2025-41234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234" }, { "name": "CVE-2025-49146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146" }, { "name": "CVE-2025-27219", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27219" }, { "name": "CVE-2025-27220", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27220" }, { "name": "CVE-2025-48976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-49124", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2022-49636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636" }, { "name": "CVE-2025-37997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997" }, { "name": "CVE-2025-38000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000" }, { "name": "CVE-2025-38001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001" }, { "name": "CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "name": "CVE-2025-32462", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462" }, { "name": "CVE-2025-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434" }, { "name": "CVE-2025-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749" }, { "name": "CVE-2025-30754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754" }, { "name": "CVE-2025-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30761" }, { "name": "CVE-2025-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059" }, { "name": "CVE-2025-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" }, { "name": "CVE-2021-3995", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3995" }, { "name": "CVE-2021-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3996" }, { "name": "CVE-2022-28948", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28948" }, { "name": "CVE-2022-29173", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29173" }, { "name": "CVE-2022-35929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35929" }, { "name": "CVE-2022-36056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36056" }, { "name": "CVE-2022-36109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36109" }, { "name": "CVE-2023-28755", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28755" }, { "name": "CVE-2023-30551", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30551" }, { "name": "CVE-2023-33199", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33199" }, { "name": "CVE-2023-33202", "url": "https://www.cve.org/CVERecord?id=CVE-2023-33202" }, { "name": "CVE-2023-46737", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46737" }, { "name": "CVE-2024-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337" }, { "name": "CVE-2024-24579", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24579" }, { "name": "CVE-2024-29902", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29902" }, { "name": "CVE-2024-29903", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29903" }, { "name": "CVE-2024-40635", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40635" }, { "name": "CVE-2024-41909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41909" }, { "name": "CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "name": "CVE-2024-47611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611" }, { "name": "CVE-2024-52587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52587" }, { "name": "CVE-2024-6104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6104" }, { "name": "CVE-2025-0913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913" }, { "name": "CVE-2025-22874", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874" }, { "name": "CVE-2025-25186", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25186" }, { "name": "CVE-2025-27221", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27221" }, { "name": "CVE-2025-29786", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29786" }, { "name": "CVE-2025-32441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32441" }, { "name": "CVE-2025-32955", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32955" }, { "name": "CVE-2025-32988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988" }, { "name": "CVE-2025-32989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989" }, { "name": "CVE-2025-32990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990" }, { "name": "CVE-2025-3445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3445" }, { "name": "CVE-2025-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177" }, { "name": "CVE-2025-46727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46727" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-47290", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47290" }, { "name": "CVE-2025-48060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060" }, { "name": "CVE-2025-4877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877" }, { "name": "CVE-2025-4878", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-49014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49014" }, { "name": "CVE-2025-4949", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4949" }, { "name": "CVE-2025-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181" }, { "name": "CVE-2025-5318", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318" }, { "name": "CVE-2025-5372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372" }, { "name": "CVE-2025-5914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914" }, { "name": "CVE-2025-5915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915" }, { "name": "CVE-2025-5916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916" }, { "name": "CVE-2025-5917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917" }, { "name": "CVE-2025-6069", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069" }, { "name": "CVE-2025-6395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395" } ], "initial_release_date": "2025-07-25T00:00:00", "last_revision_date": "2025-07-25T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0622", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35981", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35967", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35980", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35974", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35979", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35984", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35970", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35983", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35978", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35968", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35973", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35976", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35969", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35966", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35972", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35977", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35982", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35971", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971" }, { "published_at": "2025-07-24", "title": "Bulletin de s\u00e9curit\u00e9 VMware 35975", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975" } ] }
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0", "product": { "name": "Tanzu Gemfire", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4", "product": { "name": "Tanzu Greenplum", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-8941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941" }, { "name": "CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "name": "CVE-2025-22228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228" }, { "name": "CVE-2021-45078", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45078" }, { "name": "CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "name": "CVE-2024-35255", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2024-6104", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6104" }, { "name": "CVE-2022-44840", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44840" }, { "name": "CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "name": "CVE-2025-6965", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965" }, { "name": "CVE-2025-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517" }, { "name": "CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "name": "CVE-2025-52999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "name": "CVE-2025-7425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2024-12718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2025-55163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163" }, { "name": "CVE-2025-9288", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288" }, { "name": "CVE-2025-48989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989" }, { "name": "CVE-2024-41110", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41110" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-54410", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54410" }, { "name": "CVE-2025-52434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-41242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" } ], "initial_release_date": "2025-09-04T00:00:00", "last_revision_date": "2025-09-04T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0754", "revisions": [ { "description": "Version initiale", "revision_date": "2025-09-04T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-09-03", "title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085" }, { "published_at": "2025-09-03", "title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086" } ] }
CERTFR-2025-AVI-0530
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
IBM | Sterling File Gateway | Sterling File Gateway versions 6.2.0.x antérieures à 6.2.0.5 | ||
IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP12 IF02 | ||
IBM | Sterling B2B Integrator | Sterling B2B Integrator versions 6.2.0.x antérieures à 6.2.0.5 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Sterling File Gateway versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.5", "product": { "name": "Sterling File Gateway", "vendor": { "name": "IBM", "scada": false } } }, { "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP12 IF02", "product": { "name": "QRadar SIEM", "vendor": { "name": "IBM", "scada": false } } }, { "description": "Sterling B2B Integrator versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.5", "product": { "name": "Sterling B2B Integrator", "vendor": { "name": "IBM", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-31651", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651" }, { "name": "CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "name": "CVE-2025-33117", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33117" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2024-8176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176" }, { "name": "CVE-2024-53150", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53150" }, { "name": "CVE-2016-9840", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9840" }, { "name": "CVE-2020-11971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11971" }, { "name": "CVE-2025-33121", "url": "https://www.cve.org/CVERecord?id=CVE-2025-33121" }, { "name": "CVE-2020-13790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13790" }, { "name": "CVE-2024-40906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40906" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2024-12087", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12087" }, { "name": "CVE-2024-53141", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53141" }, { "name": "CVE-2024-53241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53241" }, { "name": "CVE-2025-36050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-36050" }, { "name": "CVE-2024-43842", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43842" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2024-12747", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12747" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2022-49011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49011" }, { "name": "CVE-2024-12088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12088" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" } ], "initial_release_date": "2025-06-20T00:00:00", "last_revision_date": "2025-06-20T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0530", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM", "vendor_advisories": [ { "published_at": "2025-06-18", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237159", "url": "https://www.ibm.com/support/pages/node/7237159" }, { "published_at": "2025-06-19", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237316", "url": "https://www.ibm.com/support/pages/node/7237316" }, { "published_at": "2025-06-19", "title": "Bulletin de s\u00e9curit\u00e9 IBM 7237317", "url": "https://www.ibm.com/support/pages/node/7237317" } ] }
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2", "product": { "name": "Tanzu Operations Manager", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T", "product": { "name": "Tanzu Platform", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } }, { "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894", "product": { "name": "Tanzu", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2021-45105", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2013-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548" }, { "name": "CVE-2015-4779", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779" }, { "name": "CVE-2015-4780", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780" }, { "name": "CVE-2015-4787", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787" }, { "name": "CVE-2015-4790", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790" }, { "name": "CVE-2015-4778", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778" }, { "name": "CVE-2015-4782", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782" }, { "name": "CVE-2015-4789", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789" }, { "name": "CVE-2015-4764", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764" }, { "name": "CVE-2015-4783", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783" }, { "name": "CVE-2015-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583" }, { "name": "CVE-2015-4781", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781" }, { "name": "CVE-2015-4776", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776" }, { "name": "CVE-2015-4786", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786" }, { "name": "CVE-2015-2656", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656" }, { "name": "CVE-2015-4788", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788" }, { "name": "CVE-2015-4785", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785" }, { "name": "CVE-2015-4754", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754" }, { "name": "CVE-2015-4775", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775" }, { "name": "CVE-2015-4777", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777" }, { "name": "CVE-2015-2640", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640" }, { "name": "CVE-2015-4774", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774" }, { "name": "CVE-2015-2626", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626" }, { "name": "CVE-2015-2624", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624" }, { "name": "CVE-2015-4784", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784" }, { "name": "CVE-2015-2654", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654" }, { "name": "CVE-2017-8046", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046" }, { "name": "CVE-2018-3280", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280" }, { "name": "CVE-2018-3137", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137" }, { "name": "CVE-2018-3285", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285" }, { "name": "CVE-2018-3182", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182" }, { "name": "CVE-2018-3186", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186" }, { "name": "CVE-2018-3195", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195" }, { "name": "CVE-2018-3286", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286" }, { "name": "CVE-2018-3170", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170" }, { "name": "CVE-2018-3279", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279" }, { "name": "CVE-2018-3212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212" }, { "name": "CVE-2018-3203", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203" }, { "name": "CVE-2018-3145", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145" }, { "name": "CVE-2019-2530", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530" }, { "name": "CVE-2019-2436", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436" }, { "name": "CVE-2019-2539", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539" }, { "name": "CVE-2019-2494", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494" }, { "name": "CVE-2019-2535", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535" }, { "name": "CVE-2019-2533", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533" }, { "name": "CVE-2019-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495" }, { "name": "CVE-2019-2513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513" }, { "name": "CVE-2019-2536", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536" }, { "name": "CVE-2019-2502", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502" }, { "name": "CVE-2019-2634", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634" }, { "name": "CVE-2019-2587", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587" }, { "name": "CVE-2019-2584", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584" }, { "name": "CVE-2019-2691", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691" }, { "name": "CVE-2019-2606", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606" }, { "name": "CVE-2019-2630", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630" }, { "name": "CVE-2019-2624", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624" }, { "name": "CVE-2019-2623", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623" }, { "name": "CVE-2019-2695", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695" }, { "name": "CVE-2019-2596", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596" }, { "name": "CVE-2019-2580", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580" }, { "name": "CVE-2019-2644", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644" }, { "name": "CVE-2019-2681", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681" }, { "name": "CVE-2019-2617", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617" }, { "name": "CVE-2019-2636", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636" }, { "name": "CVE-2019-2689", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689" }, { "name": "CVE-2019-2693", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693" }, { "name": "CVE-2019-2593", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593" }, { "name": "CVE-2019-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625" }, { "name": "CVE-2019-2585", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585" }, { "name": "CVE-2019-2631", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631" }, { "name": "CVE-2019-2694", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694" }, { "name": "CVE-2019-2620", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620" }, { "name": "CVE-2019-2688", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688" }, { "name": "CVE-2019-2589", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589" }, { "name": "CVE-2019-2635", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635" }, { "name": "CVE-2019-2626", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626" }, { "name": "CVE-2019-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686" }, { "name": "CVE-2019-2685", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685" }, { "name": "CVE-2019-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687" }, { "name": "CVE-2019-2607", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607" }, { "name": "CVE-2019-7317", "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317" }, { "name": "CVE-2019-2811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811" }, { "name": "CVE-2019-2740", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740" }, { "name": "CVE-2019-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879" }, { "name": "CVE-2019-2808", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808" }, { "name": "CVE-2019-2738", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738" }, { "name": "CVE-2019-2819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819" }, { "name": "CVE-2019-2737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737" }, { "name": "CVE-2019-2814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814" }, { "name": "CVE-2019-2778", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778" }, { "name": "CVE-2019-2822", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822" }, { "name": "CVE-2019-2802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802" }, { "name": "CVE-2019-2803", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803" }, { "name": "CVE-2019-2752", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752" }, { "name": "CVE-2019-2826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826" }, { "name": "CVE-2019-2784", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784" }, { "name": "CVE-2019-2789", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789" }, { "name": "CVE-2019-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801" }, { "name": "CVE-2019-2791", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791" }, { "name": "CVE-2019-2798", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798" }, { "name": "CVE-2019-2796", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796" }, { "name": "CVE-2019-2815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815" }, { "name": "CVE-2019-2810", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810" }, { "name": "CVE-2019-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780" }, { "name": "CVE-2019-2758", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758" }, { "name": "CVE-2019-2757", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757" }, { "name": "CVE-2019-2785", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785" }, { "name": "CVE-2019-2747", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747" }, { "name": "CVE-2019-2741", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741" }, { "name": "CVE-2019-2830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830" }, { "name": "CVE-2019-2834", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834" }, { "name": "CVE-2019-2743", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743" }, { "name": "CVE-2019-2739", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739" }, { "name": "CVE-2019-2805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805" }, { "name": "CVE-2019-2797", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797" }, { "name": "CVE-2019-2774", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774" }, { "name": "CVE-2019-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795" }, { "name": "CVE-2019-2746", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746" }, { "name": "CVE-2019-2812", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812" }, { "name": "CVE-2019-2924", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924" }, { "name": "CVE-2019-2914", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914" }, { "name": "CVE-2019-2960", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960" }, { "name": "CVE-2019-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923" }, { "name": "CVE-2019-2968", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968" }, { "name": "CVE-2019-2993", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993" }, { "name": "CVE-2019-3009", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009" }, { "name": "CVE-2019-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969" }, { "name": "CVE-2019-3011", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011" }, { "name": "CVE-2019-2967", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967" }, { "name": "CVE-2019-2946", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946" }, { "name": "CVE-2019-2966", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966" }, { "name": "CVE-2019-2957", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957" }, { "name": "CVE-2019-2948", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948" }, { "name": "CVE-2019-2922", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922" }, { "name": "CVE-2019-3004", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004" }, { "name": "CVE-2019-2998", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998" }, { "name": "CVE-2019-2911", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911" }, { "name": "CVE-2019-2950", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950" }, { "name": "CVE-2019-2910", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910" }, { "name": "CVE-2019-3018", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018" }, { "name": "CVE-2019-2974", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974" }, { "name": "CVE-2019-2991", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991" }, { "name": "CVE-2019-2997", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997" }, { "name": "CVE-2019-2938", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938" }, { "name": "CVE-2019-3003", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003" }, { "name": "CVE-2019-2982", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982" }, { "name": "CVE-2019-2963", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963" }, { "name": "CVE-2020-2579", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579" }, { "name": "CVE-2020-2584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584" }, { "name": "CVE-2020-2577", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577" }, { "name": "CVE-2020-2679", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679" }, { "name": "CVE-2020-2570", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570" }, { "name": "CVE-2020-2572", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572" }, { "name": "CVE-2020-2627", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627" }, { "name": "CVE-2020-2660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660" }, { "name": "CVE-2020-2589", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589" }, { "name": "CVE-2020-2573", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573" }, { "name": "CVE-2020-2686", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686" }, { "name": "CVE-2020-2694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694" }, { "name": "CVE-2020-2574", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574" }, { "name": "CVE-2020-2770", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770" }, { "name": "CVE-2020-2925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925" }, { "name": "CVE-2020-2853", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853" }, { "name": "CVE-2020-2774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774" }, { "name": "CVE-2020-2928", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928" }, { "name": "CVE-2020-2897", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897" }, { "name": "CVE-2020-2812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812" }, { "name": "CVE-2020-2765", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765" }, { "name": "CVE-2020-2761", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761" }, { "name": "CVE-2020-2790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790" }, { "name": "CVE-2020-2752", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752" }, { "name": "CVE-2020-2904", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904" }, { "name": "CVE-2020-2893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893" }, { "name": "CVE-2020-2760", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760" }, { "name": "CVE-2020-2780", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780" }, { "name": "CVE-2020-2903", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903" }, { "name": "CVE-2020-2924", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924" }, { "name": "CVE-2020-2806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806" }, { "name": "CVE-2020-2922", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922" }, { "name": "CVE-2020-2901", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901" }, { "name": "CVE-2020-2926", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926" }, { "name": "CVE-2020-2923", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923" }, { "name": "CVE-2020-2921", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921" }, { "name": "CVE-2020-2779", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779" }, { "name": "CVE-2020-2892", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892" }, { "name": "CVE-2020-2896", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896" }, { "name": "CVE-2020-2804", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804" }, { "name": "CVE-2020-2895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895" }, { "name": "CVE-2020-2930", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930" }, { "name": "CVE-2020-2814", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814" }, { "name": "CVE-2020-2759", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759" }, { "name": "CVE-2020-2763", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763" }, { "name": "CVE-2020-14550", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550" }, { "name": "CVE-2020-14567", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567" }, { "name": "CVE-2020-14559", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559" }, { "name": "CVE-2020-14576", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576" }, { "name": "CVE-2020-14540", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540" }, { "name": "CVE-2020-14547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547" }, { "name": "CVE-2020-14553", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553" }, { "name": "CVE-2020-14539", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539" }, { "name": "CVE-2020-14845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845" }, { "name": "CVE-2020-14799", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799" }, { "name": "CVE-2020-14793", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793" }, { "name": "CVE-2020-14888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888" }, { "name": "CVE-2020-14790", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790" }, { "name": "CVE-2020-14789", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789" }, { "name": "CVE-2020-14672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672" }, { "name": "CVE-2020-14846", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846" }, { "name": "CVE-2020-14771", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771" }, { "name": "CVE-2020-14873", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873" }, { "name": "CVE-2020-14791", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791" }, { "name": "CVE-2020-14769", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769" }, { "name": "CVE-2020-14844", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844" }, { "name": "CVE-2020-14809", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809" }, { "name": "CVE-2020-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860" }, { "name": "CVE-2020-14866", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866" }, { "name": "CVE-2020-14861", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861" }, { "name": "CVE-2020-14773", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773" }, { "name": "CVE-2020-14776", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776" }, { "name": "CVE-2020-14852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852" }, { "name": "CVE-2020-14760", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760" }, { "name": "CVE-2020-14870", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870" }, { "name": "CVE-2020-14837", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837" }, { "name": "CVE-2020-14893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893" }, { "name": "CVE-2020-14836", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836" }, { "name": "CVE-2020-14829", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829" }, { "name": "CVE-2020-14868", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868" }, { "name": "CVE-2020-14827", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827" }, { "name": "CVE-2020-14839", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839" }, { "name": "CVE-2020-14777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777" }, { "name": "CVE-2020-14812", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812" }, { "name": "CVE-2020-14775", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775" }, { "name": "CVE-2020-14838", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838" }, { "name": "CVE-2020-14869", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869" }, { "name": "CVE-2020-14765", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765" }, { "name": "CVE-2020-14814", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814" }, { "name": "CVE-2020-14821", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821" }, { "name": "CVE-2020-14830", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830" }, { "name": "CVE-2020-14828", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828" }, { "name": "CVE-2020-14804", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804" }, { "name": "CVE-2020-14800", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800" }, { "name": "CVE-2020-14891", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891" }, { "name": "CVE-2020-14848", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848" }, { "name": "CVE-2020-14867", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867" }, { "name": "CVE-2020-14785", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785" }, { "name": "CVE-2020-14794", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794" }, { "name": "CVE-2020-14786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786" }, { "name": "CVE-2020-15358", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358" }, { "name": "CVE-2020-1971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971" }, { "name": "CVE-2021-2010", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010" }, { "name": "CVE-2021-2001", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001" }, { "name": "CVE-2021-2060", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060" }, { "name": "CVE-2021-2014", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014" }, { "name": "CVE-2021-2032", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032" }, { "name": "CVE-2021-2036", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036" }, { "name": "CVE-2021-2007", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007" }, { "name": "CVE-2021-2011", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011" }, { "name": "CVE-2021-2022", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022" }, { "name": "CVE-2019-25013", "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013" }, { "name": "CVE-2021-2308", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308" }, { "name": "CVE-2021-2213", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213" }, { "name": "CVE-2021-2172", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172" }, { "name": "CVE-2021-2293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293" }, { "name": "CVE-2021-2208", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208" }, { "name": "CVE-2021-2196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196" }, { "name": "CVE-2021-2194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194" }, { "name": "CVE-2021-2298", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298" }, { "name": "CVE-2021-2162", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162" }, { "name": "CVE-2021-2179", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179" }, { "name": "CVE-2021-2307", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307" }, { "name": "CVE-2021-2217", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217" }, { "name": "CVE-2021-2180", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180" }, { "name": "CVE-2021-2203", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203" }, { "name": "CVE-2021-2144", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144" }, { "name": "CVE-2021-2226", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226" }, { "name": "CVE-2021-2232", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232" }, { "name": "CVE-2021-2169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169" }, { "name": "CVE-2021-2301", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301" }, { "name": "CVE-2021-2202", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202" }, { "name": "CVE-2021-2166", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166" }, { "name": "CVE-2021-2174", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174" }, { "name": "CVE-2021-2154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154" }, { "name": "CVE-2021-2193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193" }, { "name": "CVE-2021-2300", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300" }, { "name": "CVE-2021-2299", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299" }, { "name": "CVE-2021-2212", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212" }, { "name": "CVE-2021-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178" }, { "name": "CVE-2021-2146", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146" }, { "name": "CVE-2021-2230", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230" }, { "name": "CVE-2021-2278", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278" }, { "name": "CVE-2021-2164", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164" }, { "name": "CVE-2021-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201" }, { "name": "CVE-2021-2170", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170" }, { "name": "CVE-2021-2304", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304" }, { "name": "CVE-2021-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160" }, { "name": "CVE-2021-2171", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171" }, { "name": "CVE-2021-2305", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305" }, { "name": "CVE-2021-2215", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215" }, { "name": "CVE-2021-25214", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214" }, { "name": "CVE-2012-6153", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153" }, { "name": "CVE-2020-10878", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878" }, { "name": "CVE-2021-2370", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370" }, { "name": "CVE-2021-2389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389" }, { "name": "CVE-2021-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444" }, { "name": "CVE-2021-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429" }, { "name": "CVE-2021-2426", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426" }, { "name": "CVE-2021-2427", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427" }, { "name": "CVE-2021-2339", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339" }, { "name": "CVE-2021-2425", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425" }, { "name": "CVE-2021-2387", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387" }, { "name": "CVE-2021-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383" }, { "name": "CVE-2021-2372", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372" }, { "name": "CVE-2021-2399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399" }, { "name": "CVE-2021-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384" }, { "name": "CVE-2021-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412" }, { "name": "CVE-2021-2441", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441" }, { "name": "CVE-2021-2410", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410" }, { "name": "CVE-2021-2342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342" }, { "name": "CVE-2021-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437" }, { "name": "CVE-2021-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417" }, { "name": "CVE-2021-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424" }, { "name": "CVE-2021-2385", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385" }, { "name": "CVE-2021-2357", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357" }, { "name": "CVE-2021-2352", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352" }, { "name": "CVE-2021-2402", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402" }, { "name": "CVE-2021-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440" }, { "name": "CVE-2021-2340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340" }, { "name": "CVE-2021-2390", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390" }, { "name": "CVE-2021-2374", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374" }, { "name": "CVE-2021-2356", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356" }, { "name": "CVE-2021-2411", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411" }, { "name": "CVE-2021-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418" }, { "name": "CVE-2021-2367", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367" }, { "name": "CVE-2021-2354", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354" }, { "name": "CVE-2021-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422" }, { "name": "CVE-2020-10543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543" }, { "name": "CVE-2020-12723", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723" }, { "name": "CVE-2020-10029", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029" }, { "name": "CVE-2021-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337" }, { "name": "CVE-2020-28500", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500" }, { "name": "CVE-2019-18276", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276" }, { "name": "CVE-2021-3421", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421" }, { "name": "CVE-2021-3326", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326" }, { "name": "CVE-2019-2708", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708" }, { "name": "CVE-2020-27618", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618" }, { "name": "CVE-2021-35640", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640" }, { "name": "CVE-2021-35626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626" }, { "name": "CVE-2021-2478", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478" }, { "name": "CVE-2021-35624", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624" }, { "name": "CVE-2021-35583", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583" }, { "name": "CVE-2021-35628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628" }, { "name": "CVE-2021-35630", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630" }, { "name": "CVE-2021-35644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644" }, { "name": "CVE-2021-2479", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479" }, { "name": "CVE-2021-35638", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638" }, { "name": "CVE-2021-35646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646" }, { "name": "CVE-2021-35596", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596" }, { "name": "CVE-2021-35643", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643" }, { "name": "CVE-2021-35637", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637" }, { "name": "CVE-2021-35623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623" }, { "name": "CVE-2021-35632", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632" }, { "name": "CVE-2021-35641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641" }, { "name": "CVE-2021-35604", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604" }, { "name": "CVE-2021-35636", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636" }, { "name": "CVE-2021-35546", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546" }, { "name": "CVE-2021-35627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627" }, { "name": "CVE-2021-35625", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625" }, { "name": "CVE-2021-35608", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608" }, { "name": "CVE-2021-35597", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597" }, { "name": "CVE-2021-35537", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537" }, { "name": "CVE-2021-2481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481" }, { "name": "CVE-2021-35622", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622" }, { "name": "CVE-2021-35610", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610" }, { "name": "CVE-2021-35633", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633" }, { "name": "CVE-2021-35634", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634" }, { "name": "CVE-2021-35629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629" }, { "name": "CVE-2021-35631", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631" }, { "name": "CVE-2021-35645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645" }, { "name": "CVE-2021-35647", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647" }, { "name": "CVE-2021-35612", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612" }, { "name": "CVE-2021-35639", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639" }, { "name": "CVE-2021-35648", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648" }, { "name": "CVE-2021-35607", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607" }, { "name": "CVE-2021-35602", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602" }, { "name": "CVE-2021-35577", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577" }, { "name": "CVE-2021-35642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642" }, { "name": "CVE-2021-35575", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575" }, { "name": "CVE-2021-35635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635" }, { "name": "CVE-2021-35591", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591" }, { "name": "CVE-2021-25219", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219" }, { "name": "CVE-2021-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875" }, { "name": "CVE-2019-10744", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744" }, { "name": "CVE-2022-21352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352" }, { "name": "CVE-2022-21304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304" }, { "name": "CVE-2022-21254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254" }, { "name": "CVE-2022-21265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265" }, { "name": "CVE-2022-21348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348" }, { "name": "CVE-2022-21372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372" }, { "name": "CVE-2022-21245", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245" }, { "name": "CVE-2022-21368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368" }, { "name": "CVE-2022-21339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339" }, { "name": "CVE-2022-21264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264" }, { "name": "CVE-2022-21297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297" }, { "name": "CVE-2022-21379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379" }, { "name": "CVE-2022-21253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253" }, { "name": "CVE-2022-21301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301" }, { "name": "CVE-2022-21378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378" }, { "name": "CVE-2022-21370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370" }, { "name": "CVE-2022-21302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302" }, { "name": "CVE-2022-21249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249" }, { "name": "CVE-2022-21344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344" }, { "name": "CVE-2022-21270", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270" }, { "name": "CVE-2022-21367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367" }, { "name": "CVE-2022-21342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342" }, { "name": "CVE-2022-21362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362" }, { "name": "CVE-2022-21303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303" }, { "name": "CVE-2022-21256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256" }, { "name": "CVE-2022-21358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358" }, { "name": "CVE-2022-21374", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374" }, { "name": "CVE-2022-3602", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602" }, { "name": "CVE-2022-2309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309" }, { "name": "CVE-2022-29824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824" }, { "name": "CVE-2022-35737", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737" }, { "name": "CVE-2022-40303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303" }, { "name": "CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "name": "CVE-2020-8203", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203" }, { "name": "CVE-2022-3786", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786" }, { "name": "CVE-2022-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795" }, { "name": "CVE-2022-34903", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903" }, { "name": "CVE-2022-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515" }, { "name": "CVE-2022-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996" }, { "name": "CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "name": "CVE-2021-4193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193" }, { "name": "CVE-2020-15366", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366" }, { "name": "CVE-2022-22965", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965" }, { "name": "CVE-2022-0213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213" }, { "name": "CVE-2022-21418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418" }, { "name": "CVE-2022-21412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412" }, { "name": "CVE-2022-21437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437" }, { "name": "CVE-2022-21478", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478" }, { "name": "CVE-2022-21479", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479" }, { "name": "CVE-2022-21438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438" }, { "name": "CVE-2022-21440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440" }, { "name": "CVE-2022-21451", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451" }, { "name": "CVE-2022-21427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427" }, { "name": "CVE-2022-21415", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415" }, { "name": "CVE-2022-21459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459" }, { "name": "CVE-2022-21460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460" }, { "name": "CVE-2022-21414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414" }, { "name": "CVE-2022-21413", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413" }, { "name": "CVE-2022-21436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436" }, { "name": "CVE-2022-21435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435" }, { "name": "CVE-2022-21462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462" }, { "name": "CVE-2022-21444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444" }, { "name": "CVE-2022-21417", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417" }, { "name": "CVE-2022-21457", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457" }, { "name": "CVE-2022-21425", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425" }, { "name": "CVE-2022-21452", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452" }, { "name": "CVE-2021-20266", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266" }, { "name": "CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "name": "CVE-2022-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473" }, { "name": "CVE-2021-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521" }, { "name": "CVE-2021-4122", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122" }, { "name": "CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "name": "CVE-2017-7500", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500" }, { "name": "CVE-2021-33574", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574" }, { "name": "CVE-2017-11164", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164" }, { "name": "CVE-2022-21525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525" }, { "name": "CVE-2022-21537", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537" }, { "name": "CVE-2022-21455", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455" }, { "name": "CVE-2022-21534", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534" }, { "name": "CVE-2022-21528", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528" }, { "name": "CVE-2022-21529", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529" }, { "name": "CVE-2022-21531", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531" }, { "name": "CVE-2022-21515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515" }, { "name": "CVE-2022-21538", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538" }, { "name": "CVE-2022-21527", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527" }, { "name": "CVE-2022-21517", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517" }, { "name": "CVE-2022-21539", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539" }, { "name": "CVE-2022-21556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556" }, { "name": "CVE-2022-21509", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509" }, { "name": "CVE-2022-21553", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553" }, { "name": "CVE-2022-21530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530" }, { "name": "CVE-2022-21522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522" }, { "name": "CVE-2022-21547", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547" }, { "name": "CVE-2022-21569", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569" }, { "name": "CVE-2022-21526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526" }, { "name": "CVE-2021-3999", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999" }, { "name": "CVE-2022-23218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218" }, { "name": "CVE-2022-23219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219" }, { "name": "CVE-2022-27782", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782" }, { "name": "CVE-2021-25220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220" }, { "name": "CVE-2022-0396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396" }, { "name": "CVE-2022-3358", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358" }, { "name": "CVE-2022-1271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271" }, { "name": "CVE-2012-5783", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783" }, { "name": "CVE-2022-21592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592" }, { "name": "CVE-2022-21617", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617" }, { "name": "CVE-2022-21595", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595" }, { "name": "CVE-2022-21608", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608" }, { "name": "CVE-2022-21589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589" }, { "name": "CVE-2023-21863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863" }, { "name": "CVE-2023-21873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873" }, { "name": "CVE-2023-21879", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879" }, { "name": "CVE-2023-21880", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880" }, { "name": "CVE-2023-21869", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869" }, { "name": "CVE-2023-21872", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872" }, { "name": "CVE-2023-21877", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877" }, { "name": "CVE-2023-21870", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870" }, { "name": "CVE-2023-21887", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887" }, { "name": "CVE-2023-21836", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836" }, { "name": "CVE-2023-21881", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881" }, { "name": "CVE-2023-21876", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876" }, { "name": "CVE-2023-21840", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840" }, { "name": "CVE-2023-21878", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878" }, { "name": "CVE-2023-21866", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866" }, { "name": "CVE-2023-21875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875" }, { "name": "CVE-2023-21865", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865" }, { "name": "CVE-2023-21883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883" }, { "name": "CVE-2023-21867", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867" }, { "name": "CVE-2023-21874", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874" }, { "name": "CVE-2023-21871", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2022-4415", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415" }, { "name": "CVE-2023-24329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329" }, { "name": "CVE-2023-0464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464" }, { "name": "CVE-2023-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963" }, { "name": "CVE-2023-21977", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977" }, { "name": "CVE-2023-21912", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912" }, { "name": "CVE-2023-29469", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469" }, { "name": "CVE-2023-28484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484" }, { "name": "CVE-2023-20873", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873" }, { "name": "CVE-2023-20883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883" }, { "name": "CVE-2023-27535", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535" }, { "name": "CVE-2023-27538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538" }, { "name": "CVE-2023-27536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536" }, { "name": "CVE-2023-27537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537" }, { "name": "CVE-2020-1752", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752" }, { "name": "CVE-2021-35942", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942" }, { "name": "CVE-2021-38604", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604" }, { "name": "CVE-2020-29562", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562" }, { "name": "CVE-2021-27645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645" }, { "name": "CVE-2023-28322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322" }, { "name": "CVE-2022-46908", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908" }, { "name": "CVE-2023-28320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320" }, { "name": "CVE-2023-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321" }, { "name": "CVE-2023-22053", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053" }, { "name": "CVE-2023-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007" }, { "name": "CVE-2022-4899", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899" }, { "name": "CVE-2022-25883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883" }, { "name": "CVE-2023-40403", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403" }, { "name": "CVE-2023-4911", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2016-1000027", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027" }, { "name": "CVE-2023-35116", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116" }, { "name": "CVE-2023-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097" }, { "name": "CVE-2023-22084", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084" }, { "name": "CVE-2023-22026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026" }, { "name": "CVE-2023-22028", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028" }, { "name": "CVE-2023-22015", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015" }, { "name": "CVE-2023-22103", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103" }, { "name": "CVE-2023-22068", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068" }, { "name": "CVE-2023-22078", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078" }, { "name": "CVE-2023-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546" }, { "name": "CVE-2023-22059", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059" }, { "name": "CVE-2023-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066" }, { "name": "CVE-2023-22114", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114" }, { "name": "CVE-2023-22070", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070" }, { "name": "CVE-2023-22032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032" }, { "name": "CVE-2023-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2023-45853", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853" }, { "name": "CVE-2023-5678", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678" }, { "name": "CVE-2023-40217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217" }, { "name": "CVE-2023-45803", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803" }, { "name": "CVE-2021-22570", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570" }, { "name": "CVE-2023-2603", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603" }, { "name": "CVE-2023-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602" }, { "name": "CVE-2023-4527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527" }, { "name": "CVE-2023-4813", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813" }, { "name": "CVE-2023-4806", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806" }, { "name": "CVE-2022-48303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303" }, { "name": "CVE-2023-34055", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055" }, { "name": "CVE-2023-4039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039" }, { "name": "CVE-2022-3715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715" }, { "name": "CVE-2023-0687", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687" }, { "name": "CVE-2023-5156", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156" }, { "name": "CVE-2022-48522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522" }, { "name": "CVE-2023-39615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615" }, { "name": "CVE-2021-46848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848" }, { "name": "CVE-2021-33294", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294" }, { "name": "CVE-2021-43618", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618" }, { "name": "CVE-2023-45322", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322" }, { "name": "CVE-2022-28321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321" }, { "name": "CVE-2023-4016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016" }, { "name": "CVE-2013-4235", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235" }, { "name": "CVE-2023-34969", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969" }, { "name": "CVE-2021-20193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193" }, { "name": "CVE-2023-29383", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383" }, { "name": "CVE-2023-5981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2023-6237", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237" }, { "name": "CVE-2023-31484", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484" }, { "name": "CVE-2023-36054", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054" }, { "name": "CVE-2023-7104", "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104" }, { "name": "CVE-2023-6129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2023-46219", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219" }, { "name": "CVE-2024-0727", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727" }, { "name": "CVE-2023-47100", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100" }, { "name": "CVE-2023-47038", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038" }, { "name": "CVE-2023-39325", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325" }, { "name": "CVE-2022-27772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-6481", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481" }, { "name": "CVE-2023-36632", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632" }, { "name": "CVE-2024-28085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085" }, { "name": "CVE-2024-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511" }, { "name": "CVE-2020-22916", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2023-3978", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978" }, { "name": "CVE-2017-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501" }, { "name": "CVE-2021-35939", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939" }, { "name": "CVE-2024-0553", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553" }, { "name": "CVE-2021-35938", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938" }, { "name": "CVE-2021-35937", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937" }, { "name": "CVE-2023-6597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597" }, { "name": "CVE-2024-26686", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686" }, { "name": "CVE-2023-52572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572" }, { "name": "CVE-2007-4559", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559" }, { "name": "CVE-2023-3138", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138" }, { "name": "CVE-2024-28182", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182" }, { "name": "CVE-2023-45288", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288" }, { "name": "CVE-2024-4603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603" }, { "name": "CVE-2023-6378", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378" }, { "name": "CVE-2023-31486", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486" }, { "name": "CVE-2024-26739", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739" }, { "name": "CVE-2024-4741", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741" }, { "name": "CVE-2023-51074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074" }, { "name": "CVE-2023-52757", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757" }, { "name": "CVE-2024-35866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866" }, { "name": "CVE-2024-35867", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867" }, { "name": "CVE-2024-35943", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943" }, { "name": "CVE-2024-28180", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180" }, { "name": "CVE-2024-29857", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857" }, { "name": "CVE-2024-30171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171" }, { "name": "CVE-2024-30172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172" }, { "name": "CVE-2024-5535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535" }, { "name": "CVE-2024-35790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790" }, { "name": "CVE-2024-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651" }, { "name": "CVE-2024-2004", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004" }, { "name": "CVE-2024-2398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398" }, { "name": "CVE-2024-0397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397" }, { "name": "CVE-2024-4030", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030" }, { "name": "CVE-2024-4032", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032" }, { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" }, { "name": "CVE-2024-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450" }, { "name": "CVE-2024-25062", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062" }, { "name": "CVE-2024-26458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458" }, { "name": "CVE-2024-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461" }, { "name": "CVE-2024-28834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834" }, { "name": "CVE-2024-2961", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961" }, { "name": "CVE-2024-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599" }, { "name": "CVE-2024-33600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600" }, { "name": "CVE-2024-33601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601" }, { "name": "CVE-2024-33602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602" }, { "name": "CVE-2024-35195", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195" }, { "name": "CVE-2024-36945", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945" }, { "name": "CVE-2024-38540", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540" }, { "name": "CVE-2024-38541", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541" }, { "name": "CVE-2023-4641", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641" }, { "name": "CVE-2024-0567", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567" }, { "name": "CVE-2024-22365", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365" }, { "name": "CVE-2024-21137", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137" }, { "name": "CVE-2024-0760", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760" }, { "name": "CVE-2024-1737", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737" }, { "name": "CVE-2024-1975", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975" }, { "name": "CVE-2024-28835", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835" }, { "name": "CVE-2024-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923" }, { "name": "CVE-2024-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219" }, { "name": "CVE-2024-36908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908" }, { "name": "CVE-2024-27402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402" }, { "name": "CVE-2024-37891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891" }, { "name": "CVE-2024-6345", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345" }, { "name": "CVE-2024-38808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808" }, { "name": "CVE-2024-38809", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809" }, { "name": "CVE-2024-42230", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230" }, { "name": "CVE-2024-38807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807" }, { "name": "CVE-2024-6232", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232" }, { "name": "CVE-2024-6119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119" }, { "name": "CVE-2024-38816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816" }, { "name": "CVE-2022-48893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893" }, { "name": "CVE-2024-42322", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322" }, { "name": "CVE-2024-7264", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264" }, { "name": "CVE-2023-5841", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841" }, { "name": "CVE-2024-34459", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459" }, { "name": "CVE-2024-8096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096" }, { "name": "CVE-2023-6246", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246" }, { "name": "CVE-2024-46812", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812" }, { "name": "CVE-2024-46821", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821" }, { "name": "CVE-2024-46751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751" }, { "name": "CVE-2024-46753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753" }, { "name": "CVE-2024-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774" }, { "name": "CVE-2024-46787", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787" }, { "name": "CVE-2022-21454", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454" }, { "name": "CVE-2024-21193", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193" }, { "name": "CVE-2024-21194", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194" }, { "name": "CVE-2024-21196", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196" }, { "name": "CVE-2024-21197", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197" }, { "name": "CVE-2024-21198", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198" }, { "name": "CVE-2024-21199", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199" }, { "name": "CVE-2024-21201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201" }, { "name": "CVE-2024-21207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207" }, { "name": "CVE-2024-21209", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209" }, { "name": "CVE-2024-21212", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212" }, { "name": "CVE-2024-21213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213" }, { "name": "CVE-2024-21219", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219" }, { "name": "CVE-2024-21236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236" }, { "name": "CVE-2024-21239", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239" }, { "name": "CVE-2024-21241", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241" }, { "name": "CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "name": "CVE-2024-9143", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143" }, { "name": "CVE-2024-38819", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819" }, { "name": "CVE-2024-38820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820" }, { "name": "CVE-2024-10487", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487" }, { "name": "CVE-2024-10458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458" }, { "name": "CVE-2024-10459", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459" }, { "name": "CVE-2024-10460", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460" }, { "name": "CVE-2024-10461", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461" }, { "name": "CVE-2024-10462", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462" }, { "name": "CVE-2024-10463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463" }, { "name": "CVE-2024-10464", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464" }, { "name": "CVE-2024-10465", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465" }, { "name": "CVE-2024-10466", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466" }, { "name": "CVE-2024-10467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467" }, { "name": "CVE-2024-10468", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468" }, { "name": "CVE-2024-34447", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447" }, { "name": "CVE-2024-38286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286" }, { "name": "CVE-2024-7592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592" }, { "name": "CVE-2024-8088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088" }, { "name": "CVE-2024-9681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681" }, { "name": "CVE-2024-11168", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168" }, { "name": "CVE-2024-38828", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828" }, { "name": "CVE-2024-46816", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816" }, { "name": "CVE-2024-11395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395" }, { "name": "CVE-2024-49960", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960" }, { "name": "CVE-2024-50047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047" }, { "name": "CVE-2024-50073", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073" }, { "name": "CVE-2024-11691", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691" }, { "name": "CVE-2024-11692", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692" }, { "name": "CVE-2024-11693", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693" }, { "name": "CVE-2024-11694", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694" }, { "name": "CVE-2024-11695", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695" }, { "name": "CVE-2024-11696", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696" }, { "name": "CVE-2024-11697", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697" }, { "name": "CVE-2024-11698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698" }, { "name": "CVE-2024-11699", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699" }, { "name": "CVE-2024-11700", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700" }, { "name": "CVE-2024-11701", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701" }, { "name": "CVE-2024-11702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702" }, { "name": "CVE-2024-11703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703" }, { "name": "CVE-2024-11704", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704" }, { "name": "CVE-2024-11705", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705" }, { "name": "CVE-2024-11706", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706" }, { "name": "CVE-2024-11708", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708" }, { "name": "CVE-2024-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272" }, { "name": "CVE-2024-50280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280" }, { "name": "CVE-2024-11053", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053" }, { "name": "CVE-2024-10041", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041" }, { "name": "CVE-2024-10963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963" }, { "name": "CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "name": "CVE-2024-49989", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989" }, { "name": "CVE-2024-50125", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125" }, { "name": "CVE-2024-53051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051" }, { "name": "CVE-2024-53144", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144" }, { "name": "CVE-2024-8805", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805" }, { "name": "CVE-2025-0237", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237" }, { "name": "CVE-2025-0238", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238" }, { "name": "CVE-2025-0239", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239" }, { "name": "CVE-2025-0240", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240" }, { "name": "CVE-2025-0241", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241" }, { "name": "CVE-2025-0242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242" }, { "name": "CVE-2025-0243", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243" }, { "name": "CVE-2025-0245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245" }, { "name": "CVE-2025-0247", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247" }, { "name": "CVE-2025-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434" }, { "name": "CVE-2025-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435" }, { "name": "CVE-2025-0436", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436" }, { "name": "CVE-2025-0437", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437" }, { "name": "CVE-2025-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438" }, { "name": "CVE-2025-0439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439" }, { "name": "CVE-2025-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440" }, { "name": "CVE-2025-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441" }, { "name": "CVE-2025-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442" }, { "name": "CVE-2025-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443" }, { "name": "CVE-2025-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446" }, { "name": "CVE-2025-0447", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447" }, { "name": "CVE-2025-0448", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448" }, { "name": "CVE-2025-21523", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523" }, { "name": "CVE-2025-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612" }, { "name": "CVE-2025-23083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083" }, { "name": "CVE-2025-23084", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084" }, { "name": "CVE-2025-23085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085" }, { "name": "CVE-2025-0938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938" }, { "name": "CVE-2025-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444" }, { "name": "CVE-2025-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445" }, { "name": "CVE-2025-0451", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451" }, { "name": "CVE-2025-0762", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762" }, { "name": "CVE-2025-1009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009" }, { "name": "CVE-2025-1010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010" }, { "name": "CVE-2025-1011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011" }, { "name": "CVE-2025-1012", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012" }, { "name": "CVE-2025-1013", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013" }, { "name": "CVE-2025-1014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014" }, { "name": "CVE-2024-56664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664" }, { "name": "CVE-2025-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016" }, { "name": "CVE-2025-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017" }, { "name": "CVE-2025-1018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018" }, { "name": "CVE-2025-1019", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019" }, { "name": "CVE-2025-1020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020" }, { "name": "CVE-2025-0167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167" }, { "name": "CVE-2025-0725", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725" }, { "name": "CVE-2024-47535", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535" }, { "name": "CVE-2024-50258", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258" }, { "name": "CVE-2024-53203", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203" }, { "name": "CVE-2024-53128", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128" }, { "name": "CVE-2025-0995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995" }, { "name": "CVE-2025-0996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996" }, { "name": "CVE-2025-0997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997" }, { "name": "CVE-2025-0998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998" }, { "name": "CVE-2024-13176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176" }, { "name": "CVE-2025-1414", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414" }, { "name": "CVE-2025-0999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999" }, { "name": "CVE-2025-1006", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006" }, { "name": "CVE-2025-1426", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426" }, { "name": "CVE-2024-56751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751" }, { "name": "CVE-2023-39017", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017" }, { "name": "CVE-2025-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795" }, { "name": "CVE-2025-1914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914" }, { "name": "CVE-2025-1915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915" }, { "name": "CVE-2025-1916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916" }, { "name": "CVE-2025-1917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917" }, { "name": "CVE-2025-1918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918" }, { "name": "CVE-2025-1919", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919" }, { "name": "CVE-2025-1921", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921" }, { "name": "CVE-2025-1922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922" }, { "name": "CVE-2025-1923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923" }, { "name": "CVE-2025-1930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930" }, { "name": "CVE-2025-1931", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931" }, { "name": "CVE-2025-1932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932" }, { "name": "CVE-2025-1933", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933" }, { "name": "CVE-2025-1934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934" }, { "name": "CVE-2025-1935", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935" }, { "name": "CVE-2025-1936", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936" }, { "name": "CVE-2025-1937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937" }, { "name": "CVE-2025-1938", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938" }, { "name": "CVE-2025-1939", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939" }, { "name": "CVE-2025-1940", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940" }, { "name": "CVE-2025-1941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941" }, { "name": "CVE-2025-1942", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942" }, { "name": "CVE-2025-1943", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943" }, { "name": "CVE-2025-1920", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920" }, { "name": "CVE-2025-2135", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135" }, { "name": "CVE-2025-2136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136" }, { "name": "CVE-2025-2137", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137" }, { "name": "CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "name": "CVE-2024-6763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763" }, { "name": "CVE-2022-49043", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043" }, { "name": "CVE-2024-45338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338" }, { "name": "CVE-2024-51744", "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744" }, { "name": "CVE-2025-24970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970" }, { "name": "CVE-2025-25193", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193" }, { "name": "CVE-2024-45772", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772" }, { "name": "CVE-2025-2476", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476" }, { "name": "CVE-2025-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857" }, { "name": "CVE-2024-45337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337" }, { "name": "CVE-2025-22870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870" }, { "name": "CVE-2025-2783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783" }, { "name": "CVE-2022-49063", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063" }, { "name": "CVE-2022-49535", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2025-3066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066" }, { "name": "CVE-2025-3067", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067" }, { "name": "CVE-2025-3068", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068" }, { "name": "CVE-2025-3071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071" }, { "name": "CVE-2025-3072", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072" }, { "name": "CVE-2025-3073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073" }, { "name": "CVE-2025-3074", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074" }, { "name": "CVE-2025-3028", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028" }, { "name": "CVE-2025-3029", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029" }, { "name": "CVE-2025-3030", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030" }, { "name": "CVE-2025-3031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031" }, { "name": "CVE-2025-3032", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032" }, { "name": "CVE-2025-3033", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033" }, { "name": "CVE-2025-3034", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034" }, { "name": "CVE-2025-3035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035" }, { "name": "CVE-2024-54458", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458" }, { "name": "CVE-2025-3608", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608" }, { "name": "CVE-2025-21574", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574" }, { "name": "CVE-2025-21575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575" }, { "name": "CVE-2025-21577", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577" }, { "name": "CVE-2025-21579", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579" }, { "name": "CVE-2025-21580", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580" }, { "name": "CVE-2025-21581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581" }, { "name": "CVE-2025-21584", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584" }, { "name": "CVE-2025-21585", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585" }, { "name": "CVE-2025-21588", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588" }, { "name": "CVE-2025-30681", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681" }, { "name": "CVE-2025-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682" }, { "name": "CVE-2025-30683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683" }, { "name": "CVE-2025-30684", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684" }, { "name": "CVE-2025-30685", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685" }, { "name": "CVE-2025-30687", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687" }, { "name": "CVE-2025-30688", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688" }, { "name": "CVE-2025-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689" }, { "name": "CVE-2025-30693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693" }, { "name": "CVE-2025-30695", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695" }, { "name": "CVE-2025-30696", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696" }, { "name": "CVE-2025-30699", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699" }, { "name": "CVE-2025-30703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703" }, { "name": "CVE-2025-30704", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704" }, { "name": "CVE-2025-30705", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705" }, { "name": "CVE-2025-30715", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715" }, { "name": "CVE-2025-30721", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721" }, { "name": "CVE-2025-21839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839" }, { "name": "CVE-2025-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619" }, { "name": "CVE-2025-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620" }, { "name": "CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "name": "CVE-2025-21941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941" }, { "name": "CVE-2025-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956" }, { "name": "CVE-2025-21957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957" }, { "name": "CVE-2025-21959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959" }, { "name": "CVE-2025-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962" }, { "name": "CVE-2025-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963" }, { "name": "CVE-2025-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964" }, { "name": "CVE-2025-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968" }, { "name": "CVE-2025-21970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970" }, { "name": "CVE-2025-21975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975" }, { "name": "CVE-2025-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981" }, { "name": "CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "name": "CVE-2025-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992" }, { "name": "CVE-2025-21994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999" }, { "name": "CVE-2025-22004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004" }, { "name": "CVE-2025-22005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2025-22008", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008" }, { "name": "CVE-2025-22010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010" }, { "name": "CVE-2025-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014" }, { "name": "CVE-2024-12798", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798" }, { "name": "CVE-2024-12801", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801" }, { "name": "CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "name": "CVE-2025-22871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871" }, { "name": "CVE-2025-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235" }, { "name": "CVE-2025-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312" }, { "name": "CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "name": "CVE-2025-4050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050" }, { "name": "CVE-2025-4051", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051" }, { "name": "CVE-2025-4052", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052" }, { "name": "CVE-2025-4096", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096" }, { "name": "CVE-2025-2817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817" }, { "name": "CVE-2025-4082", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082" }, { "name": "CVE-2025-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083" }, { "name": "CVE-2025-4085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085" }, { "name": "CVE-2025-4087", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087" }, { "name": "CVE-2025-4088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088" }, { "name": "CVE-2025-4089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089" }, { "name": "CVE-2025-4090", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090" }, { "name": "CVE-2025-4091", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091" }, { "name": "CVE-2025-4092", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092" }, { "name": "CVE-2023-53034", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034" }, { "name": "CVE-2024-46742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742" }, { "name": "CVE-2025-21853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853" }, { "name": "CVE-2025-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025" }, { "name": "CVE-2025-22027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027" }, { "name": "CVE-2025-22035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035" }, { "name": "CVE-2025-22044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044" }, { "name": "CVE-2025-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045" }, { "name": "CVE-2025-22050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050" }, { "name": "CVE-2025-22054", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054" }, { "name": "CVE-2025-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055" }, { "name": "CVE-2025-22056", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056" }, { "name": "CVE-2025-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060" }, { "name": "CVE-2025-22063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063" }, { "name": "CVE-2025-22066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066" }, { "name": "CVE-2025-22071", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071" }, { "name": "CVE-2025-22073", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073" }, { "name": "CVE-2025-22075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075" }, { "name": "CVE-2025-22079", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079" }, { "name": "CVE-2025-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081" }, { "name": "CVE-2025-22086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086" }, { "name": "CVE-2025-22089", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089" }, { "name": "CVE-2025-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097" }, { "name": "CVE-2025-23136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136" }, { "name": "CVE-2025-23138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-37838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838" }, { "name": "CVE-2025-38152", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152" }, { "name": "CVE-2025-38575", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575" }, { "name": "CVE-2025-38637", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637" }, { "name": "CVE-2025-39728", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2025-27516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516" }, { "name": "CVE-2025-29087", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087" }, { "name": "CVE-2025-3277", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277" }, { "name": "CVE-2025-4609", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609" }, { "name": "CVE-2025-4664", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664" }, { "name": "CVE-2025-4372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372" }, { "name": "CVE-2025-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516" }, { "name": "CVE-2025-22233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233" }, { "name": "CVE-2024-55549", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549" }, { "name": "CVE-2024-9287", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287" }, { "name": "CVE-2025-24855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855" }, { "name": "CVE-2025-4918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918" }, { "name": "CVE-2025-4919", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919" }, { "name": "CVE-2025-41232", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232" }, { "name": "CVE-2025-23165", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165" }, { "name": "CVE-2025-23166", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166" }, { "name": "CVE-2025-5063", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063" }, { "name": "CVE-2025-5064", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064" }, { "name": "CVE-2025-5065", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065" }, { "name": "CVE-2025-5066", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066" }, { "name": "CVE-2025-5067", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067" }, { "name": "CVE-2025-32414", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414" }, { "name": "CVE-2025-32415", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415" }, { "name": "CVE-2022-49728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728" }, { "name": "CVE-2024-58093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093" }, { "name": "CVE-2025-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018" }, { "name": "CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "name": "CVE-2025-22062", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062" }, { "name": "CVE-2025-23145", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-37749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749" }, { "name": "CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "name": "CVE-2025-5263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263" }, { "name": "CVE-2025-5264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264" }, { "name": "CVE-2025-5265", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265" }, { "name": "CVE-2025-5266", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266" }, { "name": "CVE-2025-5267", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267" }, { "name": "CVE-2025-5268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268" }, { "name": "CVE-2025-5270", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270" }, { "name": "CVE-2025-5271", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271" }, { "name": "CVE-2025-5272", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272" }, { "name": "CVE-2025-5281", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281" }, { "name": "CVE-2025-5283", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283" }, { "name": "CVE-2025-46701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701" }, { "name": "CVE-2025-22021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021" }, { "name": "CVE-2025-23140", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140" }, { "name": "CVE-2025-23142", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142" }, { "name": "CVE-2025-23144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144" }, { "name": "CVE-2025-23146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146" }, { "name": "CVE-2025-23147", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147" }, { "name": "CVE-2025-23148", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148" }, { "name": "CVE-2025-23150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150" }, { "name": "CVE-2025-23151", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151" }, { "name": "CVE-2025-23156", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156" }, { "name": "CVE-2025-23157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157" }, { "name": "CVE-2025-23158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158" }, { "name": "CVE-2025-23159", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159" }, { "name": "CVE-2025-23161", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161" }, { "name": "CVE-2025-23163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163" }, { "name": "CVE-2025-37738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738" }, { "name": "CVE-2025-37739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739" }, { "name": "CVE-2025-37740", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740" }, { "name": "CVE-2025-37741", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741" }, { "name": "CVE-2025-37742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742" }, { "name": "CVE-2025-37756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756" }, { "name": "CVE-2025-37757", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757" }, { "name": "CVE-2025-37758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758" }, { "name": "CVE-2025-37765", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765" }, { "name": "CVE-2025-37766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766" }, { "name": "CVE-2025-37767", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767" }, { "name": "CVE-2025-37768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768" }, { "name": "CVE-2025-37770", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770" }, { "name": "CVE-2025-37771", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771" }, { "name": "CVE-2025-37773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773" }, { "name": "CVE-2025-37780", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780" }, { "name": "CVE-2025-37781", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781" }, { "name": "CVE-2025-37787", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787" }, { "name": "CVE-2025-37788", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788" }, { "name": "CVE-2025-37789", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789" }, { "name": "CVE-2025-37790", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790" }, { "name": "CVE-2025-37792", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792" }, { "name": "CVE-2025-37794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794" }, { "name": "CVE-2025-37796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796" }, { "name": "CVE-2025-37797", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797" }, { "name": "CVE-2025-37803", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803" }, { "name": "CVE-2025-37805", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805" }, { "name": "CVE-2025-37808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808" }, { "name": "CVE-2025-37810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810" }, { "name": "CVE-2025-37811", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811" }, { "name": "CVE-2025-37812", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812" }, { "name": "CVE-2025-37817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817" }, { "name": "CVE-2025-37823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823" }, { "name": "CVE-2025-37824", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824" }, { "name": "CVE-2025-37829", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829" }, { "name": "CVE-2025-37830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830" }, { "name": "CVE-2025-37836", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836" }, { "name": "CVE-2025-37839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839" }, { "name": "CVE-2025-37840", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840" }, { "name": "CVE-2025-37841", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841" }, { "name": "CVE-2025-37844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844" }, { "name": "CVE-2025-37850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850" }, { "name": "CVE-2025-37851", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851" }, { "name": "CVE-2025-37857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857" }, { "name": "CVE-2025-37858", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858" }, { "name": "CVE-2025-37859", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859" }, { "name": "CVE-2025-37862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862" }, { "name": "CVE-2025-37867", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867" }, { "name": "CVE-2025-37871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871" }, { "name": "CVE-2025-37875", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875" }, { "name": "CVE-2025-37881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881" }, { "name": "CVE-2025-37883", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883" }, { "name": "CVE-2025-37885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885" }, { "name": "CVE-2025-37889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889" }, { "name": "CVE-2025-37892", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892" }, { "name": "CVE-2025-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937" }, { "name": "CVE-2025-37940", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940" }, { "name": "CVE-2025-37982", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982" }, { "name": "CVE-2025-37983", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983" }, { "name": "CVE-2025-37985", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985" }, { "name": "CVE-2025-37989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989" }, { "name": "CVE-2025-37819", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819" }, { "name": "CVE-2025-37890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890" }, { "name": "CVE-2025-37905", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905" }, { "name": "CVE-2025-37909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909" }, { "name": "CVE-2025-37911", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911" }, { "name": "CVE-2025-37912", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912" }, { "name": "CVE-2025-37913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913" }, { "name": "CVE-2025-37914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914" }, { "name": "CVE-2025-37915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915" }, { "name": "CVE-2025-37923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923" }, { "name": "CVE-2025-37927", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927" }, { "name": "CVE-2025-37930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930" }, { "name": "CVE-2025-37932", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932" }, { "name": "CVE-2025-37949", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949" }, { "name": "CVE-2025-37964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964" }, { "name": "CVE-2025-37967", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967" }, { "name": "CVE-2025-37969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969" }, { "name": "CVE-2025-37970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970" }, { "name": "CVE-2025-37990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990" }, { "name": "CVE-2025-37991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991" }, { "name": "CVE-2025-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068" }, { "name": "CVE-2025-5419", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419" }, { "name": "CVE-2025-27144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144" }, { "name": "CVE-2025-49709", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709" }, { "name": "CVE-2025-49710", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710" }, { "name": "CVE-2023-6779", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779" }, { "name": "CVE-2023-6780", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780" }, { "name": "CVE-2024-12133", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133" }, { "name": "CVE-2024-12243", "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243" }, { "name": "CVE-2024-2236", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236" }, { "name": "CVE-2024-56433", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433" }, { "name": "CVE-2025-0395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395" }, { "name": "CVE-2025-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390" }, { "name": "CVE-2025-29088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088" }, { "name": "CVE-2025-31115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115" }, { "name": "CVE-2025-4598", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598" }, { "name": "CVE-2025-5958", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958" }, { "name": "CVE-2025-5959", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959" }, { "name": "CVE-2025-41234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234" }, { "name": "CVE-2025-49146", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" }, { "name": "CVE-2025-49124", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124" }, { "name": "CVE-2025-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125" }, { "name": "CVE-2025-6191", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191" }, { "name": "CVE-2025-6192", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192" }, { "name": "CVE-2024-53427", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427" }, { "name": "CVE-2024-56406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406" }, { "name": "CVE-2025-22872", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872" }, { "name": "CVE-2025-4802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802" }, { "name": "CVE-2022-49168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168" }, { "name": "CVE-2025-37998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998" }, { "name": "CVE-2023-42366", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366" }, { "name": "CVE-2025-6424", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424" }, { "name": "CVE-2025-6425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425" }, { "name": "CVE-2025-6426", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426" }, { "name": "CVE-2025-6427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427" }, { "name": "CVE-2025-6429", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429" }, { "name": "CVE-2025-6430", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430" }, { "name": "CVE-2025-6432", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432" }, { "name": "CVE-2025-6433", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433" }, { "name": "CVE-2025-6434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434" }, { "name": "CVE-2025-6020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020" }, { "name": "CVE-2025-6555", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555" }, { "name": "CVE-2025-6556", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556" }, { "name": "CVE-2025-6557", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557" }, { "name": "CVE-2025-6435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435" }, { "name": "CVE-2025-6436", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436" }, { "name": "CVE-2025-6554", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554" }, { "name": "CVE-2025-6021", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021" }, { "name": "CVE-2022-49636", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636" }, { "name": "CVE-2025-37997", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997" }, { "name": "CVE-2025-38000", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000" }, { "name": "CVE-2025-38001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001" }, { "name": "CVE-2025-32462", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462" }, { "name": "CVE-2025-52520", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520" }, { "name": "CVE-2025-53506", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506" }, { "name": "CVE-2024-47081", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081" }, { "name": "CVE-2025-3576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576" }, { "name": "CVE-2025-47268", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268" }, { "name": "CVE-2025-37992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992" }, { "name": "CVE-2025-37994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994" }, { "name": "CVE-2025-37995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995" }, { "name": "CVE-2025-38005", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005" }, { "name": "CVE-2025-38009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009" }, { "name": "CVE-2025-38023", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023" }, { "name": "CVE-2025-38024", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024" }, { "name": "CVE-2025-38083", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083" }, { "name": "CVE-2025-22227", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227" }, { "name": "CVE-2025-6558", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558" }, { "name": "CVE-2025-7656", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656" }, { "name": "CVE-2025-7657", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657" }, { "name": "CVE-2025-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749" }, { "name": "CVE-2025-30754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754" }, { "name": "CVE-2025-50059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059" }, { "name": "CVE-2025-50106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106" }, { "name": "CVE-2025-50088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088" }, { "name": "CVE-2025-48734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734" }, { "name": "CVE-2022-21546", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546" }, { "name": "CVE-2020-16156", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156" }, { "name": "CVE-2025-8010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010" }, { "name": "CVE-2025-8011", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011" }, { "name": "CVE-2025-8027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027" }, { "name": "CVE-2025-8028", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028" }, { "name": "CVE-2025-8029", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029" }, { "name": "CVE-2025-8030", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030" }, { "name": "CVE-2025-8031", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031" }, { "name": "CVE-2025-8032", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032" }, { "name": "CVE-2025-8033", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033" }, { "name": "CVE-2025-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034" }, { "name": "CVE-2025-8035", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035" }, { "name": "CVE-2025-8036", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036" }, { "name": "CVE-2025-8037", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037" }, { "name": "CVE-2025-8038", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038" }, { "name": "CVE-2025-8039", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039" }, { "name": "CVE-2025-8040", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040" }, { "name": "CVE-2025-8041", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041" }, { "name": "CVE-2025-8043", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043" }, { "name": "CVE-2025-8044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044" }, { "name": "CVE-2024-23337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337" }, { "name": "CVE-2024-45339", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339" }, { "name": "CVE-2024-47611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611" }, { "name": "CVE-2025-0913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913" }, { "name": "CVE-2025-22874", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874" }, { "name": "CVE-2025-32988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988" }, { "name": "CVE-2025-32989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989" }, { "name": "CVE-2025-32990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990" }, { "name": "CVE-2025-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177" }, { "name": "CVE-2025-4673", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673" }, { "name": "CVE-2025-48060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060" }, { "name": "CVE-2025-4877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877" }, { "name": "CVE-2025-4878", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878" }, { "name": "CVE-2025-48924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924" }, { "name": "CVE-2025-50181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181" }, { "name": "CVE-2025-5318", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318" }, { "name": "CVE-2025-5372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372" }, { "name": "CVE-2025-5914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914" }, { "name": "CVE-2025-5915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915" }, { "name": "CVE-2025-5916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916" }, { "name": "CVE-2025-5917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917" }, { "name": "CVE-2025-6069", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069" }, { "name": "CVE-2025-6395", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395" }, { "name": "CVE-2025-38094", "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094" }, { "name": "CVE-2025-8194", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194" }, { "name": "CVE-2025-8292", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292" }, { "name": "CVE-2025-7424", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424" }, { "name": "CVE-2025-7425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425" }, { "name": "CVE-2025-50182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182" }, { "name": "CVE-2025-5889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889" }, { "name": "CVE-2025-8576", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576" }, { "name": "CVE-2025-8577", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577" }, { "name": "CVE-2025-8578", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578" }, { "name": "CVE-2025-8579", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579" }, { "name": "CVE-2025-8580", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580" }, { "name": "CVE-2025-8581", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581" }, { "name": "CVE-2025-8582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582" }, { "name": "CVE-2025-8583", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583" }, { "name": "CVE-2025-27210", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210" }, { "name": "CVE-2025-27817", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817" }, { "name": "CVE-2025-27818", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818" }, { "name": "CVE-2025-8879", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879" }, { "name": "CVE-2025-8880", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880" }, { "name": "CVE-2025-8881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881" }, { "name": "CVE-2025-8882", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882" }, { "name": "CVE-2025-8901", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901" }, { "name": "CVE-2025-48989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989" }, { "name": "CVE-2025-7339", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339" }, { "name": "CVE-2025-7783", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783" }, { "name": "CVE-2021-32256", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256" }, { "name": "CVE-2024-25260", "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260" }, { "name": "CVE-2025-1371", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371" }, { "name": "CVE-2025-1376", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376" }, { "name": "CVE-2025-1377", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377" }, { "name": "CVE-2025-47273", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273" }, { "name": "CVE-2025-48964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964" }, { "name": "CVE-2025-49794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794" }, { "name": "CVE-2025-49796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796" }, { "name": "CVE-2025-41242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242" }, { "name": "CVE-2025-9132", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132" }, { "name": "CVE-2025-54988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988" }, { "name": "CVE-2025-6965", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965" }, { "name": "CVE-2024-13009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009" }, { "name": "CVE-2025-55668", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668" }, { "name": "CVE-2025-4674", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674" }, { "name": "CVE-2025-47907", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907" }, { "name": "CVE-2025-52999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999" }, { "name": "CVE-2025-55163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163" }, { "name": "CVE-2025-8941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941" }, { "name": "CVE-2025-9288", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288" }, { "name": "CVE-2005-2541", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541" }, { "name": "CVE-2008-5727", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727" }, { "name": "CVE-2008-5728", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728" }, { "name": "CVE-2008-5729", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729" }, { "name": "CVE-2008-5730", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730" }, { "name": "CVE-2008-5742", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742" }, { "name": "CVE-2011-3374", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374" }, { "name": "CVE-2014-4715", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715" }, { "name": "CVE-2015-2214", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214" }, { "name": "CVE-2016-0682", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682" }, { "name": "CVE-2016-0689", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689" }, { "name": "CVE-2016-0692", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692" }, { "name": "CVE-2016-0694", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694" }, { "name": "CVE-2016-2149", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149" }, { "name": "CVE-2016-2160", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160" }, { "name": "CVE-2016-3418", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418" }, { "name": "CVE-2017-10140", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140" }, { "name": "CVE-2017-12195", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195" }, { "name": "CVE-2017-12629", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629" }, { "name": "CVE-2017-3604", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604" }, { "name": "CVE-2017-3605", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605" }, { "name": "CVE-2017-3606", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606" }, { "name": "CVE-2017-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607" }, { "name": "CVE-2017-3608", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608" }, { "name": "CVE-2017-3609", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609" }, { "name": "CVE-2017-3610", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610" }, { "name": "CVE-2017-3611", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611" }, { "name": "CVE-2017-3612", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612" }, { "name": "CVE-2017-3613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613" }, { "name": "CVE-2017-3614", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614" }, { "name": "CVE-2017-3615", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615" }, { "name": "CVE-2017-3616", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616" }, { "name": "CVE-2017-3617", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617" }, { "name": "CVE-2018-1000169", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169" }, { "name": "CVE-2018-1196", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196" }, { "name": "CVE-2018-1273", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273" }, { "name": "CVE-2019-10782", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782" }, { "name": "CVE-2019-9658", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658" }, { "name": "CVE-2020-2981", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981" }, { "name": "CVE-2021-20298", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298" }, { "name": "CVE-2021-20304", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304" }, { "name": "CVE-2021-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055" }, { "name": "CVE-2021-23169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169" }, { "name": "CVE-2021-3236", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236" }, { "name": "CVE-2022-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635" }, { "name": "CVE-2022-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667" }, { "name": "CVE-2022-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219" }, { "name": "CVE-2022-39046", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046" }, { "name": "CVE-2022-42010", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010" }, { "name": "CVE-2022-42011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011" }, { "name": "CVE-2022-42012", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012" }, { "name": "CVE-2022-44638", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638" }, { "name": "CVE-2023-31437", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437" }, { "name": "CVE-2023-31438", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438" }, { "name": "CVE-2023-31439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439" }, { "name": "CVE-2023-37769", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769" }, { "name": "CVE-2023-39810", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810" }, { "name": "CVE-2023-4156", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156" }, { "name": "CVE-2023-4320", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320" }, { "name": "CVE-2023-43785", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785" }, { "name": "CVE-2023-43786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786" }, { "name": "CVE-2023-43787", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787" }, { "name": "CVE-2023-46129", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129" }, { "name": "CVE-2023-47039", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039" }, { "name": "CVE-2023-5189", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189" }, { "name": "CVE-2024-11584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584" }, { "name": "CVE-2024-21742", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742" }, { "name": "CVE-2024-22047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047" }, { "name": "CVE-2024-2397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397" }, { "name": "CVE-2024-26462", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462" }, { "name": "CVE-2024-31047", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047" }, { "name": "CVE-2024-3220", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220" }, { "name": "CVE-2024-58251", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251" }, { "name": "CVE-2024-6174", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174" }, { "name": "CVE-2024-7012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012" }, { "name": "CVE-2025-1352", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352" }, { "name": "CVE-2025-1365", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365" }, { "name": "CVE-2025-1372", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372" }, { "name": "CVE-2025-24294", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294" }, { "name": "CVE-2025-26519", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519" }, { "name": "CVE-2025-27587", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587" }, { "name": "CVE-2025-30258", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258" }, { "name": "CVE-2025-31672", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672" }, { "name": "CVE-2025-40909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909" }, { "name": "CVE-2025-43857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857" }, { "name": "CVE-2025-45582", "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582" }, { "name": "CVE-2025-45768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768" }, { "name": "CVE-2025-46392", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392" }, { "name": "CVE-2025-46394", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394" }, { "name": "CVE-2025-49795", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795" }, { "name": "CVE-2025-5115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115" }, { "name": "CVE-2025-5222", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222" }, { "name": "CVE-2025-5278", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278" }, { "name": "CVE-2025-53864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864" }, { "name": "CVE-2025-6170", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170" }, { "name": "CVE-2025-6297", "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297" }, { "name": "CVE-2025-7962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962" }, { "name": "CVE-2025-8058", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058" }, { "name": "CVE-2025-8262", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262" }, { "name": "CVE-2025-8732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732" }, { "name": "CVE-2025-8885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885" }, { "name": "CVE-2025-8916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916" }, { "name": "CVE-2025-9179", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179" }, { "name": "CVE-2025-9180", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180" }, { "name": "CVE-2025-9181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181" }, { "name": "CVE-2025-9182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182" }, { "name": "CVE-2025-9183", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183" }, { "name": "CVE-2025-9184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184" }, { "name": "CVE-2025-9185", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185" }, { "name": "CVE-2025-9187", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187" }, { "name": "CVE-2025-9308", "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308" } ], "initial_release_date": "2025-09-05T00:00:00", "last_revision_date": "2025-09-05T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0756", "revisions": [ { "description": "Version initiale", "revision_date": "2025-09-05T00:00:00.000000" } ], "risks": [ { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092" }, { "published_at": "2025-09-04", "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110" } ] }
opensuse-su-2025:15301-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat-9.0.106-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat-9.0.106-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15301", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15301-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46701 page", "url": "https://www.suse.com/security/cve/CVE-2025-46701/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48988 page", "url": "https://www.suse.com/security/cve/CVE-2025-48988/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49125 page", "url": "https://www.suse.com/security/cve/CVE-2025-49125/" } ], "title": "tomcat-9.0.106-1.1 on GA media", "tracking": { "current_release_date": "2025-07-03T00:00:00Z", "generator": { "date": "2025-07-03T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15301-1", "initial_release_date": "2025-07-03T00:00:00Z", "revision_history": [ { "date": "2025-07-03T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.106-1.1.aarch64", "product": { "name": "tomcat-9.0.106-1.1.aarch64", "product_id": "tomcat-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.106-1.1.aarch64", "product": { "name": "tomcat-admin-webapps-9.0.106-1.1.aarch64", "product_id": "tomcat-admin-webapps-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.106-1.1.aarch64", "product": { "name": "tomcat-docs-webapp-9.0.106-1.1.aarch64", "product_id": "tomcat-docs-webapp-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.106-1.1.aarch64", "product": { "name": "tomcat-el-3_0-api-9.0.106-1.1.aarch64", "product_id": "tomcat-el-3_0-api-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.106-1.1.aarch64", "product": { "name": "tomcat-embed-9.0.106-1.1.aarch64", "product_id": "tomcat-embed-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.106-1.1.aarch64", "product": { "name": "tomcat-javadoc-9.0.106-1.1.aarch64", "product_id": "tomcat-javadoc-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "product": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "product_id": "tomcat-jsp-2_3-api-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.106-1.1.aarch64", "product": { "name": "tomcat-jsvc-9.0.106-1.1.aarch64", "product_id": "tomcat-jsvc-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.106-1.1.aarch64", "product": { "name": "tomcat-lib-9.0.106-1.1.aarch64", "product_id": "tomcat-lib-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "product": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "product_id": "tomcat-servlet-4_0-api-9.0.106-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.106-1.1.aarch64", "product": { "name": "tomcat-webapps-9.0.106-1.1.aarch64", "product_id": "tomcat-webapps-9.0.106-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-9.0.106-1.1.ppc64le", "product_id": "tomcat-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-admin-webapps-9.0.106-1.1.ppc64le", "product_id": "tomcat-admin-webapps-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-docs-webapp-9.0.106-1.1.ppc64le", "product_id": "tomcat-docs-webapp-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "product_id": "tomcat-el-3_0-api-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-embed-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-embed-9.0.106-1.1.ppc64le", "product_id": "tomcat-embed-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-javadoc-9.0.106-1.1.ppc64le", "product_id": "tomcat-javadoc-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "product_id": "tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-jsvc-9.0.106-1.1.ppc64le", "product_id": "tomcat-jsvc-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-lib-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-lib-9.0.106-1.1.ppc64le", "product_id": "tomcat-lib-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "product_id": "tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.106-1.1.ppc64le", "product": { "name": "tomcat-webapps-9.0.106-1.1.ppc64le", "product_id": "tomcat-webapps-9.0.106-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.106-1.1.s390x", "product": { "name": "tomcat-9.0.106-1.1.s390x", "product_id": "tomcat-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.106-1.1.s390x", "product": { "name": "tomcat-admin-webapps-9.0.106-1.1.s390x", "product_id": "tomcat-admin-webapps-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.106-1.1.s390x", "product": { "name": "tomcat-docs-webapp-9.0.106-1.1.s390x", "product_id": "tomcat-docs-webapp-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.106-1.1.s390x", "product": { "name": "tomcat-el-3_0-api-9.0.106-1.1.s390x", "product_id": "tomcat-el-3_0-api-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-embed-9.0.106-1.1.s390x", "product": { "name": "tomcat-embed-9.0.106-1.1.s390x", "product_id": "tomcat-embed-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.106-1.1.s390x", "product": { "name": "tomcat-javadoc-9.0.106-1.1.s390x", "product_id": "tomcat-javadoc-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "product": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "product_id": "tomcat-jsp-2_3-api-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.106-1.1.s390x", "product": { "name": "tomcat-jsvc-9.0.106-1.1.s390x", "product_id": "tomcat-jsvc-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-lib-9.0.106-1.1.s390x", "product": { "name": "tomcat-lib-9.0.106-1.1.s390x", "product_id": "tomcat-lib-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "product": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "product_id": "tomcat-servlet-4_0-api-9.0.106-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.106-1.1.s390x", "product": { "name": "tomcat-webapps-9.0.106-1.1.s390x", "product_id": "tomcat-webapps-9.0.106-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.106-1.1.x86_64", "product": { "name": "tomcat-9.0.106-1.1.x86_64", "product_id": "tomcat-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.106-1.1.x86_64", "product": { "name": "tomcat-admin-webapps-9.0.106-1.1.x86_64", "product_id": "tomcat-admin-webapps-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.106-1.1.x86_64", "product": { "name": "tomcat-docs-webapp-9.0.106-1.1.x86_64", "product_id": "tomcat-docs-webapp-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.106-1.1.x86_64", "product": { "name": "tomcat-el-3_0-api-9.0.106-1.1.x86_64", "product_id": "tomcat-el-3_0-api-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.106-1.1.x86_64", "product": { "name": "tomcat-embed-9.0.106-1.1.x86_64", "product_id": "tomcat-embed-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.106-1.1.x86_64", "product": { "name": "tomcat-javadoc-9.0.106-1.1.x86_64", "product_id": "tomcat-javadoc-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "product": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "product_id": "tomcat-jsp-2_3-api-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.106-1.1.x86_64", "product": { "name": "tomcat-jsvc-9.0.106-1.1.x86_64", "product_id": "tomcat-jsvc-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.106-1.1.x86_64", "product": { "name": "tomcat-lib-9.0.106-1.1.x86_64", "product_id": "tomcat-lib-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "product": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "product_id": "tomcat-servlet-4_0-api-9.0.106-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.106-1.1.x86_64", "product": { "name": "tomcat-webapps-9.0.106-1.1.x86_64", "product_id": "tomcat-webapps-9.0.106-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x" }, "product_reference": "tomcat-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-admin-webapps-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-admin-webapps-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x" }, "product_reference": "tomcat-admin-webapps-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-admin-webapps-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-docs-webapp-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-docs-webapp-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x" }, "product_reference": "tomcat-docs-webapp-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-docs-webapp-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-el-3_0-api-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x" }, "product_reference": "tomcat-el-3_0-api-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-el-3_0-api-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-embed-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-embed-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x" }, "product_reference": "tomcat-embed-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-embed-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-javadoc-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-javadoc-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x" }, "product_reference": "tomcat-javadoc-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-javadoc-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-jsvc-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-jsvc-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x" }, "product_reference": "tomcat-jsvc-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-jsvc-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-lib-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-lib-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x" }, "product_reference": "tomcat-lib-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-lib-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64" }, "product_reference": "tomcat-webapps-9.0.106-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le" }, "product_reference": "tomcat-webapps-9.0.106-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x" }, "product_reference": "tomcat-webapps-9.0.106-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" }, "product_reference": "tomcat-webapps-9.0.106-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46701" } ], "notes": [ { "category": "general", "text": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46701", "url": "https://www.suse.com/security/cve/CVE-2025-46701" }, { "category": "external", "summary": "SUSE Bug 1243815 for CVE-2025-46701", "url": "https://bugzilla.suse.com/1243815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46701" }, { "cve": "CVE-2025-48988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48988" } ], "notes": [ { "category": "general", "text": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48988", "url": "https://www.suse.com/security/cve/CVE-2025-48988" }, { "category": "external", "summary": "SUSE Bug 1244656 for CVE-2025-48988", "url": "https://bugzilla.suse.com/1244656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-48988" }, { "cve": "CVE-2025-49125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49125" } ], "notes": [ { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49125", "url": "https://www.suse.com/security/cve/CVE-2025-49125" }, { "category": "external", "summary": "SUSE Bug 1244649 for CVE-2025-49125", "url": "https://bugzilla.suse.com/1244649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.106-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.106-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-49125" } ] }
opensuse-su-2025:15303-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat11-11.0.8-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat11-11.0.8-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15303", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15303-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46701 page", "url": "https://www.suse.com/security/cve/CVE-2025-46701/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48988 page", "url": "https://www.suse.com/security/cve/CVE-2025-48988/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49125 page", "url": "https://www.suse.com/security/cve/CVE-2025-49125/" } ], "title": "tomcat11-11.0.8-1.1 on GA media", "tracking": { "current_release_date": "2025-07-03T00:00:00Z", "generator": { "date": "2025-07-03T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15303-1", "initial_release_date": "2025-07-03T00:00:00Z", "revision_history": [ { "date": "2025-07-03T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat11-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-11.0.8-1.1.aarch64", "product_id": "tomcat11-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-admin-webapps-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-admin-webapps-11.0.8-1.1.aarch64", "product_id": "tomcat11-admin-webapps-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-doc-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-doc-11.0.8-1.1.aarch64", "product_id": "tomcat11-doc-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-docs-webapp-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-docs-webapp-11.0.8-1.1.aarch64", "product_id": "tomcat11-docs-webapp-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "product_id": "tomcat11-el-6_0-api-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-embed-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-embed-11.0.8-1.1.aarch64", "product_id": "tomcat11-embed-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "product_id": "tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-jsvc-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-jsvc-11.0.8-1.1.aarch64", "product_id": "tomcat11-jsvc-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-lib-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-lib-11.0.8-1.1.aarch64", "product_id": "tomcat11-lib-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "product_id": "tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat11-webapps-11.0.8-1.1.aarch64", "product": { "name": "tomcat11-webapps-11.0.8-1.1.aarch64", "product_id": "tomcat11-webapps-11.0.8-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat11-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-11.0.8-1.1.ppc64le", "product_id": "tomcat11-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "product_id": "tomcat11-admin-webapps-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-doc-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-doc-11.0.8-1.1.ppc64le", "product_id": "tomcat11-doc-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "product_id": "tomcat11-docs-webapp-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "product_id": "tomcat11-el-6_0-api-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-embed-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-embed-11.0.8-1.1.ppc64le", "product_id": "tomcat11-embed-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "product_id": "tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-jsvc-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-jsvc-11.0.8-1.1.ppc64le", "product_id": "tomcat11-jsvc-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-lib-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-lib-11.0.8-1.1.ppc64le", "product_id": "tomcat11-lib-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "product_id": "tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat11-webapps-11.0.8-1.1.ppc64le", "product": { "name": "tomcat11-webapps-11.0.8-1.1.ppc64le", "product_id": "tomcat11-webapps-11.0.8-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat11-11.0.8-1.1.s390x", "product": { "name": "tomcat11-11.0.8-1.1.s390x", "product_id": "tomcat11-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-admin-webapps-11.0.8-1.1.s390x", "product": { "name": "tomcat11-admin-webapps-11.0.8-1.1.s390x", "product_id": "tomcat11-admin-webapps-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-doc-11.0.8-1.1.s390x", "product": { "name": "tomcat11-doc-11.0.8-1.1.s390x", "product_id": "tomcat11-doc-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-docs-webapp-11.0.8-1.1.s390x", "product": { "name": "tomcat11-docs-webapp-11.0.8-1.1.s390x", "product_id": "tomcat11-docs-webapp-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-el-6_0-api-11.0.8-1.1.s390x", "product": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.s390x", "product_id": "tomcat11-el-6_0-api-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-embed-11.0.8-1.1.s390x", "product": { "name": "tomcat11-embed-11.0.8-1.1.s390x", "product_id": "tomcat11-embed-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "product": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "product_id": "tomcat11-jsp-4_0-api-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-jsvc-11.0.8-1.1.s390x", "product": { "name": "tomcat11-jsvc-11.0.8-1.1.s390x", "product_id": "tomcat11-jsvc-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-lib-11.0.8-1.1.s390x", "product": { "name": "tomcat11-lib-11.0.8-1.1.s390x", "product_id": "tomcat11-lib-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "product": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "product_id": "tomcat11-servlet-6_1-api-11.0.8-1.1.s390x" } }, { "category": "product_version", "name": "tomcat11-webapps-11.0.8-1.1.s390x", "product": { "name": "tomcat11-webapps-11.0.8-1.1.s390x", "product_id": "tomcat11-webapps-11.0.8-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat11-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-11.0.8-1.1.x86_64", "product_id": "tomcat11-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-admin-webapps-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-admin-webapps-11.0.8-1.1.x86_64", "product_id": "tomcat11-admin-webapps-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-doc-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-doc-11.0.8-1.1.x86_64", "product_id": "tomcat11-doc-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-docs-webapp-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-docs-webapp-11.0.8-1.1.x86_64", "product_id": "tomcat11-docs-webapp-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "product_id": "tomcat11-el-6_0-api-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-embed-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-embed-11.0.8-1.1.x86_64", "product_id": "tomcat11-embed-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "product_id": "tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-jsvc-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-jsvc-11.0.8-1.1.x86_64", "product_id": "tomcat11-jsvc-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-lib-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-lib-11.0.8-1.1.x86_64", "product_id": "tomcat11-lib-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "product_id": "tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat11-webapps-11.0.8-1.1.x86_64", "product": { "name": "tomcat11-webapps-11.0.8-1.1.x86_64", "product_id": "tomcat11-webapps-11.0.8-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat11-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-admin-webapps-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-admin-webapps-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-admin-webapps-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-admin-webapps-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-admin-webapps-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-admin-webapps-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-admin-webapps-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-doc-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-doc-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-doc-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-doc-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-doc-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-doc-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-doc-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-doc-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-docs-webapp-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-docs-webapp-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-docs-webapp-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-docs-webapp-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-docs-webapp-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-docs-webapp-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-docs-webapp-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-el-6_0-api-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-el-6_0-api-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-embed-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-embed-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-embed-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-embed-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-embed-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-embed-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-embed-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-embed-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsvc-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-jsvc-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsvc-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-jsvc-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsvc-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-jsvc-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-jsvc-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-jsvc-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-lib-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-lib-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-lib-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-lib-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-lib-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-lib-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-lib-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-lib-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-webapps-11.0.8-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64" }, "product_reference": "tomcat11-webapps-11.0.8-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-webapps-11.0.8-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le" }, "product_reference": "tomcat11-webapps-11.0.8-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-webapps-11.0.8-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x" }, "product_reference": "tomcat11-webapps-11.0.8-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat11-webapps-11.0.8-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" }, "product_reference": "tomcat11-webapps-11.0.8-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46701" } ], "notes": [ { "category": "general", "text": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46701", "url": "https://www.suse.com/security/cve/CVE-2025-46701" }, { "category": "external", "summary": "SUSE Bug 1243815 for CVE-2025-46701", "url": "https://bugzilla.suse.com/1243815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46701" }, { "cve": "CVE-2025-48988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48988" } ], "notes": [ { "category": "general", "text": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48988", "url": "https://www.suse.com/security/cve/CVE-2025-48988" }, { "category": "external", "summary": "SUSE Bug 1244656 for CVE-2025-48988", "url": "https://bugzilla.suse.com/1244656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-48988" }, { "cve": "CVE-2025-49125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49125" } ], "notes": [ { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49125", "url": "https://www.suse.com/security/cve/CVE-2025-49125" }, { "category": "external", "summary": "SUSE Bug 1244649 for CVE-2025-49125", "url": "https://bugzilla.suse.com/1244649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-admin-webapps-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-doc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-docs-webapp-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-el-6_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-embed-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsp-4_0-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-jsvc-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-lib-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-servlet-6_1-api-11.0.8-1.1.x86_64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.aarch64", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.ppc64le", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.s390x", "openSUSE Tumbleweed:tomcat11-webapps-11.0.8-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-49125" } ] }
opensuse-su-2025:15302-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat10-10.1.42-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat10-10.1.42-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15302", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15302-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46701 page", "url": "https://www.suse.com/security/cve/CVE-2025-46701/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48988 page", "url": "https://www.suse.com/security/cve/CVE-2025-48988/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49125 page", "url": "https://www.suse.com/security/cve/CVE-2025-49125/" } ], "title": "tomcat10-10.1.42-1.1 on GA media", "tracking": { "current_release_date": "2025-07-03T00:00:00Z", "generator": { "date": "2025-07-03T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15302-1", "initial_release_date": "2025-07-03T00:00:00Z", "revision_history": [ { "date": "2025-07-03T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-10.1.42-1.1.aarch64", "product_id": "tomcat10-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-admin-webapps-10.1.42-1.1.aarch64", "product_id": "tomcat10-admin-webapps-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-doc-10.1.42-1.1.aarch64", "product_id": "tomcat10-doc-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-docs-webapp-10.1.42-1.1.aarch64", "product_id": "tomcat10-docs-webapp-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "product_id": "tomcat10-el-5_0-api-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-embed-10.1.42-1.1.aarch64", "product_id": "tomcat10-embed-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "product_id": "tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-jsvc-10.1.42-1.1.aarch64", "product_id": "tomcat10-jsvc-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-lib-10.1.42-1.1.aarch64", "product_id": "tomcat10-lib-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "product_id": "tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.42-1.1.aarch64", "product": { "name": "tomcat10-webapps-10.1.42-1.1.aarch64", "product_id": "tomcat10-webapps-10.1.42-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-10.1.42-1.1.ppc64le", "product_id": "tomcat10-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "product_id": "tomcat10-admin-webapps-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-doc-10.1.42-1.1.ppc64le", "product_id": "tomcat10-doc-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "product_id": "tomcat10-docs-webapp-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "product_id": "tomcat10-el-5_0-api-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-embed-10.1.42-1.1.ppc64le", "product_id": "tomcat10-embed-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "product_id": "tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-jsvc-10.1.42-1.1.ppc64le", "product_id": "tomcat10-jsvc-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-lib-10.1.42-1.1.ppc64le", "product_id": "tomcat10-lib-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "product_id": "tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.42-1.1.ppc64le", "product": { "name": "tomcat10-webapps-10.1.42-1.1.ppc64le", "product_id": "tomcat10-webapps-10.1.42-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.42-1.1.s390x", "product": { "name": "tomcat10-10.1.42-1.1.s390x", "product_id": "tomcat10-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.42-1.1.s390x", "product": { "name": "tomcat10-admin-webapps-10.1.42-1.1.s390x", "product_id": "tomcat10-admin-webapps-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.42-1.1.s390x", "product": { "name": "tomcat10-doc-10.1.42-1.1.s390x", "product_id": "tomcat10-doc-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.42-1.1.s390x", "product": { "name": "tomcat10-docs-webapp-10.1.42-1.1.s390x", "product_id": "tomcat10-docs-webapp-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.42-1.1.s390x", "product": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.s390x", "product_id": "tomcat10-el-5_0-api-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.42-1.1.s390x", "product": { "name": "tomcat10-embed-10.1.42-1.1.s390x", "product_id": "tomcat10-embed-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "product": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "product_id": "tomcat10-jsp-3_1-api-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.42-1.1.s390x", "product": { "name": "tomcat10-jsvc-10.1.42-1.1.s390x", "product_id": "tomcat10-jsvc-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.42-1.1.s390x", "product": { "name": "tomcat10-lib-10.1.42-1.1.s390x", "product_id": "tomcat10-lib-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "product": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "product_id": "tomcat10-servlet-6_0-api-10.1.42-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.42-1.1.s390x", "product": { "name": "tomcat10-webapps-10.1.42-1.1.s390x", "product_id": "tomcat10-webapps-10.1.42-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-10.1.42-1.1.x86_64", "product_id": "tomcat10-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-admin-webapps-10.1.42-1.1.x86_64", "product_id": "tomcat10-admin-webapps-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-doc-10.1.42-1.1.x86_64", "product_id": "tomcat10-doc-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-docs-webapp-10.1.42-1.1.x86_64", "product_id": "tomcat10-docs-webapp-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "product_id": "tomcat10-el-5_0-api-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-embed-10.1.42-1.1.x86_64", "product_id": "tomcat10-embed-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "product_id": "tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-jsvc-10.1.42-1.1.x86_64", "product_id": "tomcat10-jsvc-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-lib-10.1.42-1.1.x86_64", "product_id": "tomcat10-lib-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "product_id": "tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.42-1.1.x86_64", "product": { "name": "tomcat10-webapps-10.1.42-1.1.x86_64", "product_id": "tomcat10-webapps-10.1.42-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-admin-webapps-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-admin-webapps-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-admin-webapps-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-doc-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-doc-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-doc-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-doc-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-docs-webapp-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-docs-webapp-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-docs-webapp-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-embed-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-embed-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-embed-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-embed-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-jsvc-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-jsvc-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-jsvc-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-jsvc-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-lib-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-lib-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-lib-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-lib-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64" }, "product_reference": "tomcat10-webapps-10.1.42-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le" }, "product_reference": "tomcat10-webapps-10.1.42-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x" }, "product_reference": "tomcat10-webapps-10.1.42-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" }, "product_reference": "tomcat10-webapps-10.1.42-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46701" } ], "notes": [ { "category": "general", "text": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46701", "url": "https://www.suse.com/security/cve/CVE-2025-46701" }, { "category": "external", "summary": "SUSE Bug 1243815 for CVE-2025-46701", "url": "https://bugzilla.suse.com/1243815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-46701" }, { "cve": "CVE-2025-48988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48988" } ], "notes": [ { "category": "general", "text": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48988", "url": "https://www.suse.com/security/cve/CVE-2025-48988" }, { "category": "external", "summary": "SUSE Bug 1244656 for CVE-2025-48988", "url": "https://bugzilla.suse.com/1244656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-48988" }, { "cve": "CVE-2025-49125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49125" } ], "notes": [ { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49125", "url": "https://www.suse.com/security/cve/CVE-2025-49125" }, { "category": "external", "summary": "SUSE Bug 1244649 for CVE-2025-49125", "url": "https://bugzilla.suse.com/1244649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-03T00:00:00Z", "details": "important" } ], "title": "CVE-2025-49125" } ] }
suse-su-2025:02280-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat fixes the following issues:\n\n- CVE-2025-46701: Fixed refactor CGI servlet to access resources via WebResources (bsc#1243815).\n- CVE-2025-48988: Fixed limits the total number of parts in a multi-part request and limits the size of the headers provided with each part (bsc#1244656).\n- CVE-2025-49125: Fixed expand checks for webAppMount (bsc#1244649).\n\nOther bugfixes:\n\n- Made permissions more secure (bsc#1242722) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2280,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2280,SUSE-SLE-Module-Web-Scripting-15-SP7-2025-2280,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2280,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2280,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2280,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2280,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2280,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2280,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2280,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2280,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2280,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2280,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2280,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2280,SUSE-Storage-7.1-2025-2280,openSUSE-SLE-15.6-2025-2280", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02280-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02280-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502280-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02280-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040680.html" }, { "category": "self", "summary": "SUSE Bug 1242722", "url": "https://bugzilla.suse.com/1242722" }, { "category": "self", "summary": "SUSE Bug 1243815", "url": "https://bugzilla.suse.com/1243815" }, { "category": "self", "summary": "SUSE Bug 1244649", "url": "https://bugzilla.suse.com/1244649" }, { "category": "self", "summary": "SUSE Bug 1244656", "url": "https://bugzilla.suse.com/1244656" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46701 page", "url": "https://www.suse.com/security/cve/CVE-2025-46701/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48988 page", "url": "https://www.suse.com/security/cve/CVE-2025-48988/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49125 page", "url": "https://www.suse.com/security/cve/CVE-2025-49125/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2025-07-10T16:04:29Z", "generator": { "date": "2025-07-10T16:04:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02280-1", "initial_release_date": "2025-07-10T16:04:29Z", "revision_history": [ { "date": "2025-07-10T16:04:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-9.0.106-150200.86.1.noarch", "product_id": "tomcat-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "product_id": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "product_id": "tomcat-docs-webapp-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "product_id": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-embed-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-embed-9.0.106-150200.86.1.noarch", "product_id": "tomcat-embed-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-javadoc-9.0.106-150200.86.1.noarch", "product_id": "tomcat-javadoc-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "product_id": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-jsvc-9.0.106-150200.86.1.noarch", "product_id": "tomcat-jsvc-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch", "product_id": "tomcat-lib-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "product_id": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.106-150200.86.1.noarch", "product": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch", "product_id": "tomcat-webapps-9.0.106-150200.86.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-embed-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-jsvc-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-lib-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.106-150200.86.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" }, "product_reference": "tomcat-webapps-9.0.106-150200.86.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46701" } ], "notes": [ { "category": "general", "text": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46701", "url": "https://www.suse.com/security/cve/CVE-2025-46701" }, { "category": "external", "summary": "SUSE Bug 1243815 for CVE-2025-46701", "url": "https://bugzilla.suse.com/1243815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-10T16:04:29Z", "details": "moderate" } ], "title": "CVE-2025-46701" }, { "cve": "CVE-2025-48988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48988" } ], "notes": [ { "category": "general", "text": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48988", "url": "https://www.suse.com/security/cve/CVE-2025-48988" }, { "category": "external", "summary": "SUSE Bug 1244656 for CVE-2025-48988", "url": "https://bugzilla.suse.com/1244656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-10T16:04:29Z", "details": "important" } ], "title": "CVE-2025-48988" }, { "cve": "CVE-2025-49125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49125" } ], "notes": [ { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49125", "url": "https://www.suse.com/security/cve/CVE-2025-49125" }, { "category": "external", "summary": "SUSE Bug 1244649 for CVE-2025-49125", "url": "https://bugzilla.suse.com/1244649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.106-150200.86.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.106-150200.86.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-10T16:04:29Z", "details": "moderate" } ], "title": "CVE-2025-49125" } ] }
suse-su-2025:02261-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat10", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat10 fixes the following issues:\n\n- Fixed refactor CGI servlet to access resources via WebResources (bsc#1243815).\n- Fixed limits the total number of parts in a multi-part request and \n limits the size of the headers provided with each part (bsc#1244656).\n- Fixed expand checks for webAppMount (bsc#1244649).\n- Hardening permissions (bsc#1242722)\n\nUpdate to Tomcat 10.1.42:\n\n * Fixed CVEs:\n\n + CVE-2025-46701: refactor CGI servlet to access resources via\n WebResources (bsc#1243815)\n + CVE-2025-48988: limits the total number of parts in a\n multi-part request and limits the size of\n the headers provided with each part (bsc#1244656)\n + CVE-2025-49125: Expand checks for webAppMount (bsc#1244649)\n\n * Catalina:\n\n + Add: Support for the java:module namespace which mirrors the\n java:comp namespace.\n + Add: Support parsing of multiple path parameters separated by ; in a\n single URL segment. Based on pull request #860 by Chenjp.\n + Add: Support for limiting the number of parameters in HTTP requests\n through the new ParameterLimitValve. The valve allows configurable\n URL-specific limits on the number of parameters.\n + Fix: 69699: Encode redirect URL used by the rewrite valve with the\n session id if appropriate, and handle cross context with different\n session configuration when using rewrite.\n + Add: #863: Support for comments at the end of lines in text rewrite\n map files to align behaviour with Apache httpd. Pull request\n provided by Chenjp.\n + Fix: 69706: Saved request serialization issue in FORM introduced\n when allowing infinite session timeouts.\n + Fix: Expand the path checks for Pre-Resources and Post-Resources\n mounted at a path within the web application.\n + Fix: Use of SSS in SimpleDateFormat pattern for AccessLogValve.\n + Fix: Process possible path parameters rewrite production in the\n rewrite valve.\n + Fix: 69588: Enable allowLinking to be set on PreResources,\n JarResources and PostResources. If not set explicitly, the setting\n will be inherited from the Resources.\n + Add: 69633: Support for Filters using context root mappings.\n + Fix: 69643: Optimize directory listing for large amount of files.\n Patch submitted by Loic de l\u0027Eprevier.\n + Fix: #843: Off by one validation logic for partial PUT ranges and\n associated test case. Submitted by Chenjp.\n + Refactor: Replace the unused buffer in\n org.apache.catalina.connector.InputBuffer with a static, zero\n length buffer.\n + Refactor: GCI servlet to access resources via the WebResource API.\n + Fix: 69662: Report name in exception message when a naming lookup\n failure occurs. Based on code submitted by Donald Smith.\n + Fix: Ensure that the FORM authentication attribute\n authenticationSessionTimeout works correctly when sessions have an\n infinite timeout when authentication starts.\n + Add: Provide a content type based on file extension when web\n application resources are accessed via a URL.\n * Coyote\n + Refactor: #861: TaskQueue to use the new interface RetryableQueue\n which enables better integration of custom Executors which provide\n their own BlockingQueue implementation. Pull request provided by\n Paulo Almeida.\n + Add: Finer grained control of multi-part request processing via two\n new attributes on the Connector element. maxPartCount limits the\n total number of parts in a multi-part request and maxPartHeaderSize\n limits the size of the headers provided with each part. Add support\n for these new attributes to the ParameterLimitValve.\n + Refactor: The SavedRequestInputFilter so the buffered data is used\n directly rather than copied.\n\n * Jasper:\n\n + Fix: 69696: Mark the JSP wrapper for reload after a failed\n compilation.\n + Fix: 69635: Add support to jakarta.el.ImportHandler for resolving\n inner classes.\n + Add: #842: Support for optimized execution of c:set and c:remove\n tags, when activated via JSP servlet param\n useNonstandardTagOptimizations.\n + Fix: An edge case compilation bug for JSP and tag files on case\n insensitive file systems that was exposed by the test case for\n 69635.\n\n * Web applications:\n\n + Fix: 69694: Improve error reporting of deployment tasks done using\n the manager webapp when a copy operation fails.\n + Add: 68876: Documentation. Update the UML diagrams for server\n start-up, request processing and authentication using PlantUML and\n include the source files for each diagram.\n\n * Other:\n\n + Add: Thread name to webappClassLoader.stackTraceRequestThread\n message. Patch provided by Felix Zhang.\n + Update: Tomcat Native to 2.0.9.\n + Update: The internal fork of Apache Commons FileUpload to 1.6.0-RC1\n (2025-06-05).\n + Update: EasyMock to 5.6.0.\n + Update: Checkstyle to 10.25.0.\n + Fix: Use the full path when the installer for Windows sets calls\n icacls.exe to set file permissions.\n + Update: Improvements to Japanese translations provided by tak7iji.\n + Fix: Set sun.io.useCanonCaches in service.bat Based on pull request\n #841 by Paul Lodge.\n + Update: Jacoco to 0.8.13.\n + Code: Explicitly set the locale to be used for Javadoc. For\n official releases, this locale will be English (US) to support\n reproducible builds.\n + Update: Byte Buddy to 1.17.5.\n + Update: Checkstyle to 10.23.1.\n + Update: File extension to media type mappings to align with the\n current list used by the Apache Web Server (httpd).\n + Update: Improvements to French translations.\n + Update: Improvements to Japanese translations provided by tak7iji. \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2261,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2261,SUSE-SLE-Module-Web-Scripting-15-SP7-2025-2261,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2261,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2261,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2261,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2261,openSUSE-SLE-15.6-2025-2261", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02261-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02261-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502261-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02261-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040657.html" }, { "category": "self", "summary": "SUSE Bug 1242722", "url": "https://bugzilla.suse.com/1242722" }, { "category": "self", "summary": "SUSE Bug 1243815", "url": "https://bugzilla.suse.com/1243815" }, { "category": "self", "summary": "SUSE Bug 1244649", "url": "https://bugzilla.suse.com/1244649" }, { "category": "self", "summary": "SUSE Bug 1244656", "url": "https://bugzilla.suse.com/1244656" }, { "category": "self", "summary": "SUSE CVE CVE-2025-46701 page", "url": "https://www.suse.com/security/cve/CVE-2025-46701/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-48988 page", "url": "https://www.suse.com/security/cve/CVE-2025-48988/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-49125 page", "url": "https://www.suse.com/security/cve/CVE-2025-49125/" } ], "title": "Security update for tomcat10", "tracking": { "current_release_date": "2025-07-09T17:40:32Z", "generator": { "date": "2025-07-09T17:40:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02261-1", "initial_release_date": "2025-07-09T17:40:32Z", "revision_history": [ { "date": "2025-07-09T17:40:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-doc-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-doc-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-embed-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-embed-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-jsvc-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-lib-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "product": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "product_id": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP7", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-doc-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-embed-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-lib-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-46701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-46701" } ], "notes": [ { "category": "general", "text": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-46701", "url": "https://www.suse.com/security/cve/CVE-2025-46701" }, { "category": "external", "summary": "SUSE Bug 1243815 for CVE-2025-46701", "url": "https://bugzilla.suse.com/1243815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T17:40:32Z", "details": "moderate" } ], "title": "CVE-2025-46701" }, { "cve": "CVE-2025-48988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-48988" } ], "notes": [ { "category": "general", "text": "Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-48988", "url": "https://www.suse.com/security/cve/CVE-2025-48988" }, { "category": "external", "summary": "SUSE Bug 1244656 for CVE-2025-48988", "url": "https://bugzilla.suse.com/1244656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T17:40:32Z", "details": "important" } ], "title": "CVE-2025-48988" }, { "cve": "CVE-2025-49125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-49125" } ], "notes": [ { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-49125", "url": "https://www.suse.com/security/cve/CVE-2025-49125" }, { "category": "external", "summary": "SUSE Bug 1244649 for CVE-2025-49125", "url": "https://bugzilla.suse.com/1244649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP7:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.42-150200.5.45.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.42-150200.5.45.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-07-09T17:40:32Z", "details": "moderate" } ], "title": "CVE-2025-49125" } ] }
cnvd-2025-16619
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://tomcat.apache.org/download-90.cgi
Name | ['Apache Tomcat >=11.0.0-M1,<=11.0.6', 'Apache Tomcat >=10.1.0-M1,<=10.1.40', 'Apache Tomcat >=9.0.0.M1,<=9.0.104'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2025-46701", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-46701" } }, "description": "Apache Tomcat\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u8f7b\u91cf\u7ea7Web\u5e94\u7528\u670d\u52a1\u5668\u3002\u7528\u4e8e\u5b9e\u73b0\u5bf9Servlet\u548cJavaServer Page\uff08JSP\uff09\u7684\u652f\u6301\u3002\n\nApache Tomcat\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u5bf9GCI servlet\u4e2d\u7684\u533a\u5206\u5927\u5c0f\u5199\u6f0f\u6d1e\u5904\u7406\u4e0d\u5f53\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tomcat.apache.org/download-90.cgi", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2025-16619", "openTime": "2025-07-22", "patchDescription": "Apache Tomcat\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u8f7b\u91cf\u7ea7Web\u5e94\u7528\u670d\u52a1\u5668\u3002\u7528\u4e8e\u5b9e\u73b0\u5bf9Servlet\u548cJavaServer Page\uff08JSP\uff09\u7684\u652f\u6301\u3002\r\n\r\nApache Tomcat\u5b58\u5728\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u5bf9GCI servlet\u4e2d\u7684\u533a\u5206\u5927\u5c0f\u5199\u6f0f\u6d1e\u5904\u7406\u4e0d\u5f53\u9020\u6210\u7684\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5b89\u5168\u9650\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apache Tomcat\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-16619\uff09\u7684\u8865\u4e01", "products": { "product": [ "Apache Tomcat \u003e=11.0.0-M1\uff0c\u003c=11.0.6", "Apache Tomcat \u003e=10.1.0-M1\uff0c\u003c=10.1.40", "Apache Tomcat \u003e=9.0.0.M1\uff0c\u003c=9.0.104" ] }, "referenceLink": "http://www.openwall.com/lists/oss-security/2025/05/29/4", "serverity": "\u9ad8", "submitTime": "2025-06-11", "title": "Apache Tomcat\u5b89\u5168\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2025-16619\uff09" }
ghsa-h2fw-rfh5-95r3
Vulnerability from github
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "9.0.0.M1" }, { "fixed": "9.0.105" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.41" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "9.0.0.M1" }, { "fixed": "9.0.105" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.41" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "8.5.0" }, { "last_affected": "8.5.100" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat.embed:tomcat-embed-core" }, "ranges": [ { "events": [ { "introduced": "8.5.0" }, { "last_affected": "8.5.100" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-46701" ], "database_specific": { "cwe_ids": [ "CWE-178" ], "github_reviewed": true, "github_reviewed_at": "2025-05-29T22:37:21Z", "nvd_published_at": "2025-05-29T19:15:27Z", "severity": "LOW" }, "details": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.", "id": "GHSA-h2fw-rfh5-95r3", "modified": "2025-08-08T18:59:37Z", "published": "2025-05-29T21:31:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46701" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/0f01966eb60015d975525019e12a087f05ebf01a" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/238d2aa54b99f91d1111467e2237d2244c64e558" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/2c6800111e7d8d8d5403c07978ea9bff3db5a5a5" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/8cb95ff03221067c511b3fa66d4f745bc4b0a605" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/8df00018a252baa9497615d6420fb6c10466fa74" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/fab7247d2f0e3a29d5daef565f829f383e10e5e2" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.41" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.7" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.105" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2025/05/29/4" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear", "type": "CVSS_V4" } ], "summary": "Apache Tomcat - CGI security constraint bypass" }
fkie_cve-2025-46701
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/05/29/4 | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F40F219-F606-447E-ACCD-D7A96093ED91", "versionEndExcluding": "9.0.105", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BA93AAE-946D-4DF3-AF9F-36C83FB7F1CB", "versionEndExcluding": "10.1.41", "versionStartIncluding": "10.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "6475FBD6-E85B-4926-813F-CAE6A742871A", "versionEndExcluding": "11.0.7", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Handling of Case Sensitivity vulnerability in Apache Tomcat\u0027s GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions \nmay also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue." }, { "lang": "es", "value": "La vulnerabilidad de manejo incorrecto de la distinci\u00f3n entre may\u00fasculas y min\u00fasculas en el servlet GCI de Apache Tomcat permite eludir las restricciones de seguridad aplicables al componente pathInfo de una URI asignada al servlet CGI. Este problema afecta a Apache Tomcat: de la 11.0.0-M1 a la 11.0.6, de la 10.1.0-M1 a la 10.1.40 y de la 9.0.0.M1 a la 9.0.104. Se recomienda a los usuarios actualizar a las versiones 11.0.7, 10.1.41 o 9.0.105, que solucionan el problema." } ], "id": "CVE-2025-46701", "lastModified": "2025-08-08T12:15:28.257", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-05-29T19:15:27.983", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2025/05/29/4" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-178" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.