Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-25547 (GCVE-0-2026-25547)
Vulnerability from cvelistv5 – Published: 2026-02-04 21:51 – Updated: 2026-02-05 14:31- CWE-1333 - Inefficient Regular Expression Complexity
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| isaacs | brace-expansion |
Affected:
< 5.0.1
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-25547",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-05T14:24:50.676205Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-05T14:31:38.349Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "brace-expansion",
"vendor": "isaacs",
"versions": [
{
"status": "affected",
"version": "\u003c 5.0.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1333",
"description": "CWE-1333: Inefficient Regular Expression Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-04T21:51:17.198Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"source": {
"advisory": "GHSA-7h2j-956f-4vf2",
"discovery": "UNKNOWN"
},
"title": "Uncontrolled Resource Consumption in @isaacs/brace-expansion"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2026-25547",
"datePublished": "2026-02-04T21:51:17.198Z",
"dateReserved": "2026-02-02T19:59:47.376Z",
"dateUpdated": "2026-02-05T14:31:38.349Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-25547\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2026-02-04T22:16:00.813\",\"lastModified\":\"2026-02-05T14:57:20.563\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":9.2,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]}],\"references\":[{\"url\":\"https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-25547\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-05T14:24:50.676205Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-05T14:24:51.376Z\"}}], \"cna\": {\"title\": \"Uncontrolled Resource Consumption in @isaacs/brace-expansion\", \"source\": {\"advisory\": \"GHSA-7h2j-956f-4vf2\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 9.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"isaacs\", \"product\": \"brace-expansion\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 5.0.1\"}]}], \"references\": [{\"url\": \"https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2\", \"name\": \"https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1333\", \"description\": \"CWE-1333: Inefficient Regular Expression Complexity\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2026-02-04T21:51:17.198Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-25547\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-05T14:31:38.349Z\", \"dateReserved\": \"2026-02-02T19:59:47.376Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2026-02-04T21:51:17.198Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-25547
Vulnerability from fkie_nvd - Published: 2026-02-04 22:16 - Updated: 2026-02-05 14:57| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1."
},
{
"lang": "es",
"value": "@isaacs/brace-expansion es una bifurcaci\u00f3n de TypeScript h\u00edbrida CJS/ESM de brace-expansion. Antes de la versi\u00f3n 5.0.1, @isaacs/brace-expansion es vulnerable a un problema de denegaci\u00f3n de servicio (DoS) causado por la expansi\u00f3n ilimitada de rangos de llaves. Cuando un atacante proporciona un patr\u00f3n que contiene rangos de llaves num\u00e9ricos repetidos, la librer\u00eda intenta generar \u00e1vidamente cada combinaci\u00f3n posible de forma s\u00edncrona. Debido a que la expansi\u00f3n crece exponencialmente, incluso una entrada peque\u00f1a puede consumir CPU y memoria excesivas y puede bloquear el proceso de Node.js. Este problema ha sido parcheado en la versi\u00f3n 5.0.1."
}
],
"id": "CVE-2026-25547",
"lastModified": "2026-02-05T14:57:20.563",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-04T22:16:00.813",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
GHSA-7H2J-956F-4VF2
Vulnerability from github – Published: 2026-02-03 19:41 – Updated: 2026-02-05 00:36Summary
@isaacs/brace-expansion is vulnerable to a Denial of Service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process.
Details
The vulnerability occurs because @isaacs/brace-expansion expands brace expressions without any upper bound or complexity limit. Expansion is performed eagerly and synchronously, meaning the full result set is generated before returning control to the caller.
For example, the following input:
{0..99}{0..99}{0..99}{0..99}{0..99}
produces:
100^5 = 10,000,000,000 combinations
This exponential growth can quickly overwhelm the event loop and heap memory, resulting in process termination.
Proof of Concept
The following script reliably triggers the issue.
Create poc.js:
const { expand } = require('@isaacs/brace-expansion');
const pattern = '{0..99}{0..99}{0..99}{0..99}{0..99}';
console.log('Starting expansion...');
expand(pattern);
Run it:
node poc.js
The process will freeze and typically crash with an error such as:
FATAL ERROR: JavaScript heap out of memory
Impact
This is a denial of service vulnerability. Any application or downstream dependency that uses @isaacs/brace-expansion on untrusted input may be vulnerable to a single-request crash.
An attacker does not require authentication and can use a very small payload to:
- Trigger exponential computation
- Exhaust memory and CPU resources
- Block the event loop
- Crash Node.js services relying on this library
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 5.0.0"
},
"package": {
"ecosystem": "npm",
"name": "@isaacs/brace-expansion"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.0.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-25547"
],
"database_specific": {
"cwe_ids": [
"CWE-1333"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-03T19:41:15Z",
"nvd_published_at": "2026-02-04T22:16:00Z",
"severity": "HIGH"
},
"details": "### Summary\n\n`@isaacs/brace-expansion` is vulnerable to a Denial of Service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process.\n\n### Details\n\nThe vulnerability occurs because `@isaacs/brace-expansion` expands brace expressions without any upper bound or complexity limit. Expansion is performed eagerly and synchronously, meaning the full result set is generated before returning control to the caller.\n\nFor example, the following input:\n\n```\n{0..99}{0..99}{0..99}{0..99}{0..99}\n```\n\nproduces:\n\n```\n100^5 = 10,000,000,000 combinations\n```\n\nThis exponential growth can quickly overwhelm the event loop and heap memory, resulting in process termination.\n\n### Proof of Concept\n\nThe following script reliably triggers the issue.\n\nCreate `poc.js`:\n\n```js\nconst { expand } = require(\u0027@isaacs/brace-expansion\u0027);\n\nconst pattern = \u0027{0..99}{0..99}{0..99}{0..99}{0..99}\u0027;\n\nconsole.log(\u0027Starting expansion...\u0027);\nexpand(pattern);\n```\n\nRun it:\n\n```bash\nnode poc.js\n```\n\nThe process will freeze and typically crash with an error such as:\n\n```\nFATAL ERROR: JavaScript heap out of memory\n```\n\n### Impact\n\nThis is a denial of service vulnerability. Any application or downstream dependency that uses `@isaacs/brace-expansion` on untrusted input may be vulnerable to a single-request crash.\n\nAn attacker does not require authentication and can use a very small payload to:\n\n* Trigger exponential computation\n* Exhaust memory and CPU resources\n* Block the event loop\n* Crash Node.js services relying on this library",
"id": "GHSA-7h2j-956f-4vf2",
"modified": "2026-02-05T00:36:54Z",
"published": "2026-02-03T19:41:15Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25547"
},
{
"type": "PACKAGE",
"url": "https://github.com/isaacs/brace-expansion"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "@isaacs/brace-expansion has Uncontrolled Resource Consumption"
}
OPENSUSE-SU-2026:10236-1
Vulnerability from csaf_opensuse - Published: 2026-02-23 00:00 - Updated: 2026-02-23 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "heroic-games-launcher-2.20.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the heroic-games-launcher-2.20.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10236",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10236-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25547 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-26278 page",
"url": "https://www.suse.com/security/cve/CVE-2026-26278/"
}
],
"title": "heroic-games-launcher-2.20.0-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-23T00:00:00Z",
"generator": {
"date": "2026-02-23T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10236-1",
"initial_release_date": "2026-02-23T00:00:00Z",
"revision_history": [
{
"date": "2026-02-23T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "heroic-games-launcher-2.20.0-1.1.aarch64",
"product": {
"name": "heroic-games-launcher-2.20.0-1.1.aarch64",
"product_id": "heroic-games-launcher-2.20.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "heroic-games-launcher-2.20.0-1.1.ppc64le",
"product": {
"name": "heroic-games-launcher-2.20.0-1.1.ppc64le",
"product_id": "heroic-games-launcher-2.20.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "heroic-games-launcher-2.20.0-1.1.s390x",
"product": {
"name": "heroic-games-launcher-2.20.0-1.1.s390x",
"product_id": "heroic-games-launcher-2.20.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "heroic-games-launcher-2.20.0-1.1.x86_64",
"product": {
"name": "heroic-games-launcher-2.20.0-1.1.x86_64",
"product_id": "heroic-games-launcher-2.20.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "heroic-games-launcher-2.20.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64"
},
"product_reference": "heroic-games-launcher-2.20.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "heroic-games-launcher-2.20.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le"
},
"product_reference": "heroic-games-launcher-2.20.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "heroic-games-launcher-2.20.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x"
},
"product_reference": "heroic-games-launcher-2.20.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "heroic-games-launcher-2.20.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
},
"product_reference": "heroic-games-launcher-2.20.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25547"
}
],
"notes": [
{
"category": "general",
"text": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25547",
"url": "https://www.suse.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "SUSE Bug 1257834 for CVE-2026-25547",
"url": "https://bugzilla.suse.com/1257834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-23T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-25547"
},
{
"cve": "CVE-2026-26278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-26278"
}
],
"notes": [
{
"category": "general",
"text": "fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it\u0027s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application. Version 5.3.6 fixes the issue. As a workaround, avoid using DOCTYPE parsing by `processEntities: false` option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-26278",
"url": "https://www.suse.com/security/cve/CVE-2026-26278"
},
{
"category": "external",
"summary": "SUSE Bug 1258547 for CVE-2026-26278",
"url": "https://bugzilla.suse.com/1258547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.aarch64",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.ppc64le",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.s390x",
"openSUSE Tumbleweed:heroic-games-launcher-2.20.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-23T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-26278"
}
]
}
OPENSUSE-SU-2026:20261-1
Vulnerability from csaf_opensuse - Published: 2026-02-23 19:35 - Updated: 2026-02-23 19:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openQA, os-autoinst, openQA-devel-container",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openQA, os-autoinst, openQA-devel-container fixes the following issues:\n\nChanges in openQA:\n\n- Update to version 5.1771422749.560a3b26:\n * fix(mcp): set navbar check expression to read-only\n * feat: support inverted result filters in /tests/overview\n * fix(test): Enable helm install-chart test again\n * git subrepo pull (merge) --force external/os-autoinst-common\n * feat: Make allowed hosts for SCENARIO_DEFINITIONS_YAML_FILE configurable\n * test: Consider everything under `lib/OpenQA/Shared/` covered\n * fix: Provide specific error message if job was removed `enqueue_\u2026_track`\n * refactor: Remove useless error message in `enqueue_and_keep_track`\n * test: Cover case of successful executing in `enqueue_and_keep_track`\n * refactor: Simplify error handling of `enqueue_and_keep_track`\n * test: Cover error handling of `enqueue_and_keep_track`\n * test: Consider shared session controller fully covered\n * refactor: Avoid duplications in sessions controller\n * refactor: Use signatures in session controller code\n * test: Cover error handling in case of a bad CRSF token\n * test: Cover test route for session\n * fix(worker): reject jobs explicitly when worker is stopping\n * feat: Remove workaround for codecov and gpg\n * feat: Switch to Leap 16 in Helm charts\n * feat: Switch to Leap 16.0 in openqa_data container\n * feat: Replace all Leap 15.6 with 16.0 in docs and scripts\n * test: Cover showing special image when backend has terminated\n * fix: Use new apachectl command\n * Update openQA containers to Leap 16.0\n * test: Extend tests for controller handling live view\n * refactor: Move throttling into its own function\n * feat(throttling): throttle jobs resources based on parameters size\n * refactor: Avoid repeated use of `$t-\u003eapp-\u003eminion` in gru tasks tests\n * feat: Allow archiving jobs with infinite important storage durations\n * feat: Flag jobs without results as archived for consistency\n * feat: Remove one corner case preventing jobs from being archived\n\n- Update to version 5.1770718745.ce2072d3:\n * feat(ui): use clickable test overview summary counts for quick filtering\n * build(Makefile): fix uninterruptable tests\n * docs: Mention caveats of `\u2026_cleanup_max_free_percentage` setting\n * test(25-cache-service): fix race conditions\n * test(ui/21-admin-needles): properly wait for modal dialog and deletion\n * test(ui/13-admin): properly wait for API key deletion\n * test(40-openqa-clone-job): properly isolate from system config\n * test(15-asset): bump timeout to current runtime\n * chore: fix CVE-2026-25547 (boo#1257852) by overriding minimatch\n * build(deps-dev): bump @eslint from 9.36.0 to 9.38.0\n * fix(eslint): correct style to be eslint-9.38 compliant\n * build(deps-dev): bump @eslint-community/regexpp from 4.12.1 to 4.12.2\n * build(deps-dev): bump @eslint/config-array from 0.21.0 to 0.21.1\n * build(deps-dev): bump @eslint/object-schema from 2.1.6 to 2.1.7\n * refactor: Improve variable names in function to determine expired jobs\n * test: Improve name of subtest for archiving\n * test: Verify that archiving works regardless of logs/results present\n * Dependency cron 2026-02-06\n * Bump js-yaml from 4.1.0 to 4.1.1\n * build(deps): bump ace-builds from 1.43.3 to 1.43.4\n\n- Update to version 5.1770308102.12dfd0e4:\n * fix: Configure sudoers correctly in Leap 16\n * Also use devel:openQA/16.0 in dependency bot workflow\n * test: Consider all controller code covered\n * refactor: Remove unused \"group connect\" endpoints\n * test: Cover `openqa_jobs_by_worker` field of InfluxDB endpoint\n * test: Cover all cases of search of audit log table\n * refactor: Simplify function to render audit log index page\n * test: Add test for `eventid` parameter of audit log page\n * test: Cover remaining lines of `Asset.pm`\n\n- Update to version 5.1769644379.ef069e9d:\n\nChanges in os-autoinst:\n\n- Update to version 5.1771353921.c8005c9:\n * git subrepo pull (merge) --force external/os-autoinst-common\n * style: Fix crop.py style issues\n * workaround: Remove \"get_mempolicy\" warning from qemu-img output\n * parse_extra_log: Allow passing additional args to upload_logs\n * refactor: Distinguish tests by the script path in `loadtest`\n * refactor: Simplify approach for avoiding redefine warnings\n\n- Update to version 5.1770715824.6a80a85:\n * style: Fix crop.py style issues\n * workaround: Remove \"get_mempolicy\" warning from qemu-img output\n * parse_extra_log: Allow passing additional args to upload_logs\n * refactor: Distinguish tests by the script path in `loadtest`\n * refactor: Simplify approach for avoiding redefine warnings\n * test: Allow running tests with `Test::Warnings\u003c0.033`\n * test: Format test of `loadtestdir` in a more compact way\n\n- Update to version 5.1770127521.c249fe9:\n * refactor: Distinguish tests by the script path in `loadtest`\n * refactor: Simplify approach for avoiding redefine warnings\n * test: Allow running tests with `Test::Warnings\u003c0.033`\n * test: Format test of `loadtestdir` in a more compact way\n * test: Use `ENABLE_MODERN_PERL_FEATURES=1` in test suite\n * feat: Allow enabling strict/warnings/signatures globally\n * fix: Improve wrong comment about enablement of modern Perl features\n\nChanges in openQA-devel-container:\n\n- Update to version 5.1771422749.560a3b26b:\n * Update to latest openQA version\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-139",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20261-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1257852",
"url": "https://bugzilla.suse.com/1257852"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25547 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25547/"
}
],
"title": "Security update for openQA, os-autoinst, openQA-devel-container",
"tracking": {
"current_release_date": "2026-02-23T19:35:27Z",
"generator": {
"date": "2026-02-23T19:35:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20261-1",
"initial_release_date": "2026-02-23T19:35:27Z",
"revision_history": [
{
"date": "2026-02-23T19:35:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"product_id": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"product_id": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"product_id": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"product_id": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"product": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"product_id": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"product": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"product_id": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"product_id": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"product_id": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64"
},
"product_reference": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le"
},
"product_reference": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x"
},
"product_reference": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64"
},
"product_reference": "openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64"
},
"product_reference": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le"
},
"product_reference": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x"
},
"product_reference": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64"
},
"product_reference": "os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25547"
}
],
"notes": [
{
"category": "general",
"text": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25547",
"url": "https://www.suse.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "SUSE Bug 1257834 for CVE-2026-25547",
"url": "https://bugzilla.suse.com/1257834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-auto-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-client-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-common-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-devel-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-doc-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-local-db-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-mcp-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-munin-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.aarch64",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.s390x",
"openSUSE Leap 16.0:openQA-worker-5.1771422749.560a3b26-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1.x86_64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.aarch64",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.s390x",
"openSUSE Leap 16.0:os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-23T19:35:27Z",
"details": "important"
}
],
"title": "CVE-2026-25547"
}
]
}
OPENSUSE-SU-2026:10168-1
Vulnerability from csaf_opensuse - Published: 2026-02-10 00:00 - Updated: 2026-02-10 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "openQA-5.1770718745.ce2072d3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the openQA-5.1770718745.ce2072d3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10168",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10168-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25547 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25547/"
}
],
"title": "openQA-5.1770718745.ce2072d3-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-10T00:00:00Z",
"generator": {
"date": "2026-02-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10168-1",
"initial_release_date": "2026-02-10T00:00:00Z",
"revision_history": [
{
"date": "2026-02-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-client-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-common-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-devel-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-doc-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-munin-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"product": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"product_id": "openQA-worker-5.1770718745.ce2072d3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-client-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-common-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"product": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"product_id": "openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-client-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-common-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-devel-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-doc-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-local-db-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-mcp-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-munin-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"product": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"product_id": "openQA-worker-5.1770718745.ce2072d3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openQA-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-client-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-common-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-devel-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-doc-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-munin-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.x86_64",
"product": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.x86_64",
"product_id": "openQA-worker-5.1770718745.ce2072d3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-client-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-common-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-devel-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-doc-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-munin-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.aarch64"
},
"product_reference": "openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le"
},
"product_reference": "openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.s390x"
},
"product_reference": "openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openQA-worker-5.1770718745.ce2072d3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.x86_64"
},
"product_reference": "openQA-worker-5.1770718745.ce2072d3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-25547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25547"
}
],
"notes": [
{
"category": "general",
"text": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25547",
"url": "https://www.suse.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "SUSE Bug 1257834 for CVE-2026-25547",
"url": "https://bugzilla.suse.com/1257834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-auto-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-bootstrap-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-client-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-common-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-continuous-update-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-devel-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-doc-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-local-db-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-mcp-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-munin-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-python-scripts-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-single-instance-nginx-5.1770718745.ce2072d3-1.1.x86_64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.aarch64",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.ppc64le",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.s390x",
"openSUSE Tumbleweed:openQA-worker-5.1770718745.ce2072d3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-25547"
}
]
}
OPENSUSE-SU-2026:20239-1
Vulnerability from csaf_opensuse - Published: 2026-02-17 09:54 - Updated: 2026-02-17 09:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for golang-github-prometheus-prometheus",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for golang-github-prometheus-prometheus fixes the following issues:\n\n- CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841)\n- CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897)\n- CVE-2025-61140: Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-290",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20239-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1257442",
"url": "https://bugzilla.suse.com/1257442"
},
{
"category": "self",
"summary": "SUSE Bug 1257841",
"url": "https://bugzilla.suse.com/1257841"
},
{
"category": "self",
"summary": "SUSE Bug 1257897",
"url": "https://bugzilla.suse.com/1257897"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1615 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-25547 page",
"url": "https://www.suse.com/security/cve/CVE-2026-25547/"
}
],
"title": "Security update for golang-github-prometheus-prometheus",
"tracking": {
"current_release_date": "2026-02-17T09:54:15Z",
"generator": {
"date": "2026-02-17T09:54:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20239-1",
"initial_release_date": "2026-02-17T09:54:15Z",
"revision_history": [
{
"date": "2026-02-17T09:54:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"product": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"product_id": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"product": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"product_id": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"product": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"product_id": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64",
"product": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64",
"product_id": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64"
},
"product_reference": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le"
},
"product_reference": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x"
},
"product_reference": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
},
"product_reference": "golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-61140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61140"
}
],
"notes": [
{
"category": "general",
"text": "The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61140",
"url": "https://www.suse.com/security/cve/CVE-2025-61140"
},
{
"category": "external",
"summary": "SUSE Bug 1257442 for CVE-2025-61140",
"url": "https://bugzilla.suse.com/1257442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-17T09:54:15Z",
"details": "important"
}
],
"title": "CVE-2025-61140"
},
{
"cve": "CVE-2026-1615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1615"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package jsonpath before 1.2.0 are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1615",
"url": "https://www.suse.com/security/cve/CVE-2026-1615"
},
{
"category": "external",
"summary": "SUSE Bug 1257897 for CVE-2026-1615",
"url": "https://bugzilla.suse.com/1257897"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-17T09:54:15Z",
"details": "critical"
}
],
"title": "CVE-2026-1615"
},
{
"cve": "CVE-2026-25547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-25547"
}
],
"notes": [
{
"category": "general",
"text": "@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-25547",
"url": "https://www.suse.com/security/cve/CVE-2026-25547"
},
{
"category": "external",
"summary": "SUSE Bug 1257834 for CVE-2026-25547",
"url": "https://bugzilla.suse.com/1257834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.aarch64",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.ppc64le",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.s390x",
"openSUSE Leap 16.0:golang-github-prometheus-prometheus-3.5.0-160000.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-17T09:54:15Z",
"details": "important"
}
],
"title": "CVE-2026-25547"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.